© Raymond Pompon 2016

Raymond Pompon, IT Security Risk Control Management, 10.1007/978-1-4842-2140-2_13

13. Administrative Controls

Raymond Pompon

(1)Seattle, Washington, USA

Don’t write with a pen. Ink tends to give the impression the words shouldn’t be changed.

—Richard Hugo, The Triggering Town

There is a tendency to lean for security practitioners to heavily on technical and physical controls. Machines do the same thing every time, forever and ever. Humans are more variable in their execution of tasks. However, we aren’t at the point where machines run themselves (I for one welcome our new robot overlords). Administrative controls are how you manage all this technology and associated controls in accordance with your stated security goals. We’ve talked about Courtney’s laws before. Now here’s one more.

Courtney’s third law states

There are no technical solutions to management problems, but there are management solutions to technical problems.1

There are many ways to interpret this (including having management fire all the tech staff and outsource them!) but let’s look at how we use documented processes to manage technology. This definitely includes how we manage technical controls, but administrative controls are also very powerful in managing normal IT operations.

Control Maturity

As a consultant, I listened to many clients tell me they had good processes, but they just didn’t ever write them down. They were sure everyone did the right things, but no one documented anything. When we began to check on what was actually going on, we discovered that there was a lot of divergence among what each person thought he was supposed to be doing. Worse, we often encountered complicated but critical tasks performed by a single person that were completely mysterious to upper management. When that person went on vacation or got ill, those tasks stopped. For some organizations, things were done differently, based on the time of the day and the amount of time that people had available. This may all be fine for some business and technical processes, but it’s precarious for security controls that you depend on. It’s also a deficiency finding during an audit.

Many organizations have a verbal work culture . They prefer face-to-face meetings and conference calls to e-mail and chat. They value getting together and hashing things out to investigate and decide on critical matters. There’s nothing wrong with this, but there should be some written processes for some things. For one, conveying information verbally is excellent for establishing a personal and deep connection with people. It’s also time-consuming and inconsistent. Some verbal processes simply do not scale. Once you get beyond a dozen people in a single discussion, meetings can last for hours. Many organizations now are globally dispersed, so setting up a conference call for status check-ins can get tricky when you have more than three time zones. Lastly, verbal processes do not leave behind permanent records that can be reviewed and analyzed later. If you missed any of these big meetings and no one took minutes (converted verbal to written), then you are short out of luck. Also, no records means no metrics.

Capability Maturity Model

One of the ways that organizational processes are assessed is with the Capability Maturity Model (CMM ). The CMM was developed to evaluate and rate military contractors on how well they might perform on software projects. The CMM helps determine things like how repeatable a process is, whether a process can be taken over by another individual, and how a process can be measured. To do this, the five-step scale shown in Figure 13-1 was developed.

A417436_1_En_13_Fig1_HTML.gif
Figure 13-1. Capability Maturity Model

The CMM is so handy and powerful that some auditors (including myself) have used it for rapid assessment of an organization’s security processes. Consider the security of an organization with no published security policy—where users are added and removed haphazardly. Patching takes place when someone gets around to it rather than on a schedule. Think about how hard it would be improve processes if there is no consensus on how they are performed. It may sound like I’m beating a dead equine here, but one of the biggest challenges I’ve had in moving organizations to a secure and audited state was convincing them to document their processes (and follow those documents).

The Power of Good Admin Controls

Some people say that using documented processes and following checklists slows them down and they get less work done. In reality, having defined methods for performing complex tasks build accuracy and speed. There are less errors (and less redoing) and better understanding of the process. With documented processes, work can be handed off to newcomers with less-handholding and training. Finally, documented processes are easier to automate because the algorithm has already been laid out.

Keep Them Updated

To be useful, administrative processes need to be reliable or they are worse than useless, they are misleading. An unsuspecting admin using an outdated process document could easily cause major system failures or create new security vulnerabilities. Documents need to be kept current to match the relevant tasks and environments. You should not carve administrative processes in stone; they should be fluid and always be checked and updated as needed. The first step in making sure this happens is assigning ownership to a process. The owner does not need be the one updating the process either, only to ensure that an update is performed. For example, ownership of the move/add/change user process could be given to manager of the helpdesk. She could then assign the updating of the procedure as needed. Managers need to ensure that their staff is given the responsibility and the time to update documents. An old management trick is to assign updating the process to a new hire that is paired with a veteran to assist them. As the newcomer learns the process, they also can work to update the document. Many technical document management systems can be set up to e-mail reminders to the owner periodically to review and update procedures.

Some organizations use internal wiki sites to store all their administrative policies . Since wikis are designed to support living, evolving documentation for a large number of people, they work well for this kind of thing. All changes are visible as well as who performed them and when. Policies can be set up to hotlink standards and procedures. Explanatory documents and external sites can also be linked as needed.

Differences in Documents

You read about the different kinds of administrative controls back in Chapter 11, on policy, so let’s dive deeper. There is a top security policy document for the organization, which defines the high-level goals. In Figure 13-2, you can see how you can have more policies for specific control objectives with specific audiences in mind.

A417436_1_En_13_Fig2_HTML.jpg
Figure 13-2. Example of policy relationships

This is not the perfect list. As things mature and go obsolete, you need to add and drop policies around different control objectives. In addition, you may choose to break down these control objectives into different groups or combine them in other ways. The coverage and upkeep is what is important, not the individual documents.

From these policies, you can build up the standards to describe how technology should be used to support the policy. The standard can lay out minimum baselines for settings, acceptable technologies, and responsibility matrices.

Below the standards are the procedures, which are the run books to tell people step-by-step how to perform tasks. Procedures can be detailed with screenshots and specific commands or they can be checklists for implementation. Many organizations develop standardized templates for procedures, with version numbers, to help people keep things straight. There are plenty of examples of policies, standards, and procedures for the specific control objectives. Let’s jump right into some of those critical IT operational policies the support security right now.

Critical Admin Control: Asset Management

You may remember how important inventory is from the chapters on risk analysis (Chapters 3, 4, and 5). You’ll want a policy covering this and making sure responsibility is assigned to get it done. Next is a sample policy describing what should be included.

Sample Asset Management Policy

ORGANIZATION will identify, track, and record all IT and IT-related assets. The IT Operations Department will be responsible for maintaining standards and procedures related to IT assets. These standards will include:

  • IT assets and IT-related tracked

  • Asset details tracked

  • Baseline workstation and server configuration standards

  • Approved software applications

  • Asset inventory procedure

The asset inventory will be updated at least quarterly and be subject to both internal and external audits.

Sample Asset Management Standard

As you can see, this policy calls for additional standards and procedures. You can have standards and procedures without them being required to be written by the policy. However, if you want them to be created, you should mandate them in the policy. It’s in both IT and security department’s interest to have a good asset inventory. Here is a snippet of what should be included in the asset standards.

Assets tracked will include:

  • Confidential data

  • Contracts, support agreements, and legal records

  • Software assets and their associated licenses

  • Physical assets such as workstations, laptops, servers, cell phones, network devices and security equipment

  • Portable digital media such as floppy disks, tapes, external drives, Bernoulli boxes, and USB sticks

  • Local and offsite virtual guest imaged, saved machine images, and the virtualization servers

  • Internal and third-party tokens, cryptographic keys, certificates, and passwords for accessing offsite data resources

Asset details tracked:

  • Hardware: Brand, make/model, MAC address, Serial #, Location, Owner

  • Tokens & Certificates: Code key, Affiliation, Owner, Expirationdate

This policy will be reviewed on an annual basis and may change regulations or requirements.

Critical Admin Control: Change Control

When introduced into environments for the first time, some organizations see Change control as a major pain in the posterior. I’ve heard the complaints: “Oh, the paper work! And getting approval before IT does anything? Do you realize how much that will slow things down? This is just like auditors, making us jump through hoops just to do our job!” In fact, there is proven business value in change control.

Change control is a foundational control for SSAE 16 SOC 1 but is also a requirement in PCI DSS and ISO 27001. Change control is a powerful control for ensuring that systems are maintained in a known, tested state. Since updates, patches, and new configurations are performed in standard, predictable ways, IT operations are efficient and stable. The IT Process Institute found that 80% of unplanned outages were because of poorly planned changes.2

Change control means there is a documented process that governs all modifications to scoped systems. Access to those systems is minimized and monitored. Tools should record all changes for later review by system owners and auditors. In general, change control forces IT to pay attention to what they’re doing. Figure 13-3 describes a typical flow for change control.

A417436_1_En_13_Fig3_HTML.gif
Figure 13-3. Change Control Process flow

Sample Change Control Policy

The purpose of the Change Control Policy is to ensure that our organization’s IT department can deliver quality updates to our internal customers. Good change control accommodates change through proven processes, ensuring clear requirements and reliable results. Change control is done to reduce the risk of unauthorized changes, unplanned outages, failed changes, emergency changes, and operational delays. Policy requirements:

  • Requests for changes to critical IT systems will be coordinated in a timely, transparent, and efficient manner

  • There is a Change Control Board comprised of representatives from IT support, IT applications, IT operations, and the departments being served

  • Changes can be proposed to the change control board by anyone within the organization through the IT support help desk

  • Change requests must include reason, systems affected, back out plan, location of code for change

  • Whenever possible, proposed changes will be tested and the test results submitted along with the change request

  • Changes to Production Hosted systems must be approved by the Change Control Board

  • The Change Control Board will meet weekly, or sooner as needed, to review and approve proposedchanges

  • Proposed changes are assessed for potential impact to eliminate unnecessary or disruptive changes are minimized

  • Changes will be carried out solely by the IT operations team - Changes must be verified to be complete and correct by the change requester

  • Unauthorized changes will be considered a security policy violation and individuals will be held accountable for violations

  • These Change processes will be subject to internal and external audits.

The Operations group will maintain a standard describing proper change management processes. This standard will include the following components:

  • Roles and responsibilities

  • Requests

  • Change planning and testing

  • Evaluation: approval/rejection

  • Maintenance windows

  • Verification

  • Rollback

  • Documentation

  • Emergency changes

This policy will be reviewed on an annual basis and may change regulations or requirements.

Change Control Standards

There should be standards around change control that support the policy by defining key items within change control. These standards should include:

  • What constitutes a change?

    • Application changes?

    • Hardware changes?

    • Operating system changes?

    • Network changes?

    • Facility changes?

  • How are changes classified?

    • How is risk of change effects determined?

      • Experience with change?

      • Impact to neighboring systems?

      • Scope of change?

      • Time to complete change?

      • Systems involved in change?

      • Quality Assurance review of change?

    • What are emergency changes and how can the normal process be bypassed for an outage but documented and explained

    • What are low-risk pre-authorized changes that do not need approval?

  • What is an acceptable back out plan?

  • What are the acceptable change windows?

Change Control Tracking

Part of the change control process is detecting if anyone bypassed it. There should be additional controls in place supporting the change control process that monitor for unauthorized changes. A number of technical controls can be used to keep track of changes, including file integrity monitoring or cloud configuration logging.

Because of the utility of change control, it’s a good idea to track metrics around the process to demonstrate how effective the system is for improving IT and security operations. Here are some useful metrics to consider:

  • The number of changes that meet requirements (successful change)

  • System uptime

  • The number of unauthorized changes

  • The number of emergency changes

  • The average time to perform change

  • Outages caused by changes

  • The accuracy of change time estimates

Critical Admin Control: Application Security

Application security is big and important—so much so that entire books and security certifications exist on the topic. Application security is critical, and I don’t want to omit it, but I don’t have the space to do it justice either. So you should just be aware that I’m skimming the surface of this major area of security.

Application security refers to writing and acquiring software applications that meet a security standard. It involves security in designing the software, how the software is coded, how the code is protected, and how secure the code is in different risk environments. Next is a sample high-level security policy on application security that should give you an idea of the expectations. The standards and procedures related to application security can get deep, but are worth looking into if you do internal development of applications that process or store confidential data.

Sample Application Security Policy

The ORGANIZATION will maintain and follow secure application development and maintenance processes to minimize unauthorized access, modification, or downtime to ORGANIZATION applications.

To support this objective:

  • The Security Department and the Software Development department will develop, publish and use secure coding standards based on industry best secure development practices

  • Software Developers will have adequate secure application education & training

  • Software Developers will use a Threat model and will be educated on common attacks, such as the Open Web Application Security Project (OWASP) Top Ten Vulnerabilities, to inform their threat model.

  • There will be adequate separation of privileges between development, QA, and production environments.

  • Development and Test data will not contain confidential information or personally identifiable information.

  • Source code will be protected from exposure, tampering, and loss.

  • As part of software release, the Software Developers will ensure that test data and accounts are not present.

  • On an ongoing basis, the Security department will facilitate third-party security tests of in-house developedapplications

  • Software Vulnerabilities will be tracked, risk rated, and remediated.

  • The Security department will conduct periodic reviews to test compliance against this policy.

This policy will be reviewed on an annual basis and may change regulations or requirements.

Application Security Standards

Many application standards can flow from the preceding sample policy. One that comes to mind is a standard around vulnerability assessment, which might work well as a RACI diagram, as follows.

Function

Responsible

Accountable

Consulted

Informed

Vulnerability assessment

Security

Development

QA

App owner

Vulnerability scoring

Security

Development

QA

App owner

Remediation

Development

App owner

QA

Security

Verification of remediation

Security

Development

QA

App owner

A second important standard would be the guideline for developers to follow, which could look like the following sample.

Sample Secure Software Design Standards

  • Sessions and authentication data will be protected from impersonation, unauthorized modification, and sessionhijacking

  • Web applications will facilitate client-side security through the use of browser directives

  • User error screens will not reveal confidential or detailed system configuration information

  • Application authentication mechanisms will be robust and resist brute-force guessing attacks

  • Applications will validate input and output data

  • Administrative or configuration data will not be visible to unauthorized users

Software Acquisition

Just as important as developing software that is secure to a tolerable level of risk, is acquiring software that meets that standard. The acceptable usage policy guides users in making sure they only use approved, known safe software. Likewise, the IT department should work with the security team when on-boarding major software applications, especially if those applications interact with scoped systems or data.

To make this job easier, there should be a software acquisition policy that requires the security department to analyze and approve new IT systems. There can also be an accompanying standard that provides criteria for measuring the security and acceptability of new applications. This standard could include things such as the following:

  • Applications must support existing organizational control objectives and policies. For example, authentication systems much support organizational password standards, logging systems must support organizational logging standard

  • Software must be third-party tested for security vulnerabilities with no significant vulnerabilities present

  • Internet-facing web application systems must be tested against the current OWASP top ten vulnerabilities with no significant vulnerabilities present

  • Software should be capable of producing human-readable configuration information for audit and configuration review

  • Manufacturer must disclose all maintenance and administrative access modes including any “developer backdoors” or automated callbacks outside of the organization

  • Applications performing security functions must have up-to-date product assurance certification of advertised functionality from well-known independent evaluator such as Underwriter Labs (UL), Federal Information Processing Standards (FIPS), ICSA CyberTrust, or National Information Assurance Partnership (NIAP)/Common Criteria.

Critical Manual Control: Record and Media Management

Your organization’s records are a critical asset, so you should have policies and procedures in place to protect them. Some policies distinguish between paper and electronic records, while others combine into a single policy.

Critical records almost certainly include e-mail and internal messaging systems, as these are the kinds of records that are relevant in litigations and criminal investigations. When it comes to lawsuits, it’s always better to be able to produce the relevant, and only the relevant, records when requested by the court. Organizations that are unable to provide records in lawsuits are often viewed by judges with suspicion. Organizations can risk legal penalties and negative inferences in the case for not being able to find critical records. This means that the security and IT departments should work with legal counsel to develop a realistic record retention schedule. Business norm in the United States is a retention period of seven years. The IT department should make sure that they have adequate capacity and technology to be able to store and find records.

Speaking of lawsuits, quite a few breach negligence cases stem with an organization losing or improperly disposing of things like laptops and backup tapes. Media, such as drives and tapes that contain confidential information needs to be properly tracked, secured, and when the time comes, thoroughly destroyed.

Sample Record and Media Management Policy

ORGANIZATION recognizes that record management is important. To meet that goal, ORGANIZATION will have standards and procedures in place to inhibit the intentional or negligent withholding, alteration, or destruction of internal records. Records and media containing confidential and personal private information will be protected against unauthorized exposure. To meet these goals, the ORGANIZATION will do the following:

  • Critical records will be identified and documented in a standard and communicated to all relevant persons within the organization

  • Location and responsibility for records and media will be tracked

  • Record retention standards that are feasible and appropriate to the organization will be defined and approved by legal

  • Records will be protected from physical and electronic threats with controls

  • Records will be stored in a manner that they can be retrieved quickly when requested. A procedure for record retrieval will be written and updated.

  • Data archival and destruction timelines will be tracked and records scheduled for destruction when due.

  • Media and records will be securely erased or destroyed in such a manner as to make inadvertent recovery impossible and intentional recovery impractical. Standards will be developed to describe the secure erasure and destruction processes.

  • Procedures will be written for records and media being transported off premises

This policy will be reviewed on an annual basis and may change regulations or requirements.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset