Management and Cyber Security
Abstract
ISI
is one of the leading solutions providers specialized in Cybersecurity,
System Infrastructure, Application Delivery Optimization, Data Center,
Storage and Data Protection. They are officially partnered with the key
Industry leaders. ISI serves a number of industry verticals including
but not limited to, Service Providers, Oil & Gas, Media, Education
and Healthcare.
The IT decision Makers at some of the largest Oil
& Gas Companies, Universities and Pharmaceuticals have nominated ISI
as their preferred technology partner. ISI team consists of one of the
highly qualified, certified experienced and skilled engineers. Their
team specializes in the areas of IP Networks, Systems and Security,
Application Delivery and Data Protection solutions.
As an
organization which offers cybersecurity solutions to
enterprises, ISI have additional responsibility to keep their
customers proprietary information as secure as possible. Security
awareness is placed as a priority when conducting business operations.
ISI understands its responsibility to ensure
that they maintain resources integrity, proprietary information is kept
secure, and all stakeholders feel assured with the security practices of
the organization
This Information System Security Plan (ISSP)
reflects the security practices and resources within the domain of ISI.
The purpose of this ISSP is to illustrate the processes and courses of
actions utilized by ISI in order to decrease its attack surface to
security-related incidents. This ISSP showcases the security awareness
and risk mitigation processes that is adopted and implemented by ISI.
This ISSP covers cyber security with an emphasis on management
strategies that ensure that organizational goals are met. ISI developed
ISSP using the guidelines of NIST 800 Special Publications, which
defines the objective of information system security planning is to
improve protection of information system resources. Organization like
ISI have some level of sensitivity and require protection as part of
good management practice. The protection of a system must be documented
in a system security plan. The purpose of the system security plan is to
provide an overview of the security requirements of the system and
describe the controls in place or planned for meeting those
requirements. The system security plan also delineates responsibilities
and expected behavior of all individuals who access the system. The
system security plan should be viewed as documentation of the structured
process of planning adequate, cost-effective security protection for a
system.
Company Summary
ISI
believe in strong relationships with customers and provide them the
best suited, solutions to maintain the competitive edge in today's
dynamic IT network industry. Their commitment is to work very closely
with the customers starting from the concept initiating phase of the
project. The close coordination with the customers remains throughout
the Design, Implementation and Support Phases. ISI ensure a seamless
roll out of the solution. They propose reliable cutting-edge solutions
to enterprise customers according to their requirements in order for
them to better maintain their business operations efficiently.
Enterprise Architecture
ISI's architecture
is not too different than a traditional enterprise architecture. The
company manages 3 data centers, 20 branches, DMZ
and had enabled few SaaS services and applications. ISI's website is
hosted on their public web servers within the DMZ. Their website
"isi.org" uses TLS security for access which enable encryption and
secure linkage to secure database server for end user authentication. In
the data center, ISI have deployed for Firewall North South traffic and
IPS (Intrusion Prevention System) inline to ensure security when users
access applications from the data centers. The firewall is configured in
cluster mode with application visibility and anti-malware protection is
turned on. IPS is configured in monitor mode and it will send alerts to
an in-house SIEM. Firewalls and IPSs have 3-5 years software
subscription contract enabled.
ISI have also enabled zero trust in
their environment which lets the end-user go through MFA (Multi Factor
Authentication). Additionally, it also utilizes a MySQL database
management server to store the credentials of its end-users. Only hashed
outputs of the usernames and passwords are kept in ISI database
server.
All design documentations of customers, quotations and
other proprietary information is maintained and distributed through ISI
documentation server. This server is kept in secure and locked
environment and only authorized personnel are permitted access.
Administrator access is only permitted to the CEO/CISO/Security
Specialist team of ISI and all communication is monitored and logged.
The server is only accessible to authentication, authorization, and
accounting services used by ISI to validate the identity and permissions
of incoming network connections.
Management
ISI Management
team specializes in the areas of IP Networks, Systems and Security,
Application Delivery and Data Protection solutions. The management
personnel of ISI consist of dedicated professionals and relevant
experiences. These professionals have completed a thorough background
check of their degrees and experience.
- Roles and Responsibilities
The Chief Marketing Officer (CMO) of ISI is responsible for driving the marketing strategy of the company and all the advertising campaigns, market research, trainings, collaterals and other marketing activities must come from his organization. The CMO reports directly to the CEO of ISI. The Chief Information System Officer (CISO) and his team is responsible for the security of the organization. CISO and his legal and compliance team ensure that ISI is in compliance with state and federal regulations. The CISO develops and implement the security policies framework across the company. This position requires in-depth experience and expertise in cybersecurity field which requires writing security policy and understanding of security architectures. The CISO reports directly to the CEO of ISI and keeps him or her abreast on the security posture of the organization.
ISI have different offices or business units within the company for example a) Office of CEO b) Office of CISO c) Office of CMO etc., there are 10s of employees within each office. CISO manages the compliance team as well so the chief compliance officers' team under the leadership of chief compliance officer reports to CISO.
- Planning Management
- Implementation Management
- Human Resource Management
Planning
Information Security Implementation
- Physical security
- Intrusion detector
- CCTV, smart cards
- Fire extinguisher
- Guards
- Suppression systems
- Intrusion alarm
- Motion detectors
- Physical access
- Chain link fence
- RFID tags
- Barbed wire
- Access control
- Website Data Security
- Mobile and Cloud service
- Timely Integration of Information
- Reliable Communication
- System Development and Maintenance
- Contingency Planning
- Natural Calamities
- Power Outage
- Business Continuity Plan
Implementation Management
- Proposed Timeline/Execution
- Budget
- Risk Management
At ISI, risk assessment is conducted on a monthly schedule to determine potential avenues of approach for an attacker. The risk assessment is conducted by the risk management team, along with the IT team. The risk assessment is conducted to determine the quantitative impact of a cyber-attack, vulnerability or system malfunction. A critical component to the success of ISI is its brand as the best solution integrator in the industry. Consequently, ISI conducts a qualitative risk assessment to determine the level of impact that loss of credibility or public trust will impose. The results of both assessments illustrate the security posture of the organization and is used to allocate funds to decrease the attack surface of the organization.
- Mitigation Planning, Implementation & Monitoring
- Cost Management
The CISO of ISI is responsible for determining a cost-effective methodology to manage risk to the organization. The goal of ISI's risk management strategy is ensuring that the CEO makes decisions that do not expose the organization to unforeseen threats. ISI takes into account industry best practices and conducts an inherent risk profile using the FSSCC risk calculator to determine its security posture. Once calculated, the senior management decides on cost-effective mitigation strategies for ISI.
- Analysis & Recommendation Management
The infrastructure for ISI is primarily based on third-party involvement. As stated, before ISI might conduct quarterly risk assessments, but these assessments do not include the intricate and proprietary infrastructures of the cloud services, network monitoring, and learning management systems that an adversary could use as an attack vector.
- Student Assessment of ISSP to Cyber Management
Reflection
The development of ISSP (Information System Security Plan) provided the guidelines, details of the best practices, policies and plan needed to secure the data or information systems. It gives us the complete picture of how an organization enable processes and plan to secure their networks, systems, applications. We learnt during this course the actual purpose of ISSP is to provide an overview of the security requirements of the system and describe the controls in place or planned, responsibilities and expected behavior of all individuals who access the system.
The system security plan should be viewed as documentation of the structured process of planning adequate, cost-effective security protection for a system. It should reflect input from various managers with responsibilities concerning the system, including information owners, the system operator, and the system security manager. Additional information may be included in the basic plan and the structure and format organized according to agency needs, so long as the major sections described in this document are adequately covered and readily identifiable. Cybersecurity practices implemented using the ISSP have as their aim the securing-that is, the keeping safe-of data, computer systems and networks (software and hardware). While those data, systems, and networks might have some economic or other value in and of themselves, what cybersecurity practices primarily protect are the integrity, functionality, and reliability of human institutions/practices that rely upon such data, systems, and networks. And in protecting those institutions and practices, cybersecurity professionals or leaders in turn are protecting the lives and happiness of the human beings who depend upon them.
This means that ethical issues are at the core of cybersecurity practices, because these practices are increasingly required to secure and shield the ability of human individuals and groups to live well. And given the increasing complexity and difficulty of securing online data and systems across a proliferating landscape of cloud computing services, WiFi-enabled mobile devices, and 'smart' objects-from a multiplicity of hostile actors exploiting lax or under- resourced security controls-the ethical responsibility to protect others that is borne by cybersecurity professionals is an increasingly heavy burden.
References
NIST. (2006, February). SP 800-18 Rev. 1, Guide for Developing Security Plans for Federal Information Systems. Retrieved July 1, 2018, from https://csrc.nist.gov/publications/detail/sp/800-18/rev-1/final
Touhill, G. J., & Touhill, C. J. (2014). Cybersecurity for Executives: A Practical Guide.
Hoboken, NJ: Wiley.
Information Continuity Aspects of Business Continuity Management - Retrieved from https://www.isms.online/iso-27001/annex-a-17-information-security-aspects-of-business-continuity-management/