241 lines
12 KiB
Plaintext
241 lines
12 KiB
Plaintext
|
||
CSL BULLETIN
|
||
August 1993
|
||
|
||
|
||
SECURITY PROGRAM MANAGEMENT
|
||
This bulletin discusses the establishment and operation of a
|
||
security program as a management function and describes some of
|
||
the features and issues common to most organizations. OMB
|
||
Circular A-130, "Management of Federal Information Resources,"
|
||
June 25, 1993, requires that federal agencies establish computer
|
||
security programs. Because organizations differ in size,
|
||
complexity, management styles, and culture, it is not possible to
|
||
describe one ideal security program.
|
||
|
||
Structure of a Security Program
|
||
Security programs are often distributed throughout the
|
||
organization with different elements performing different
|
||
functions. Sometimes the distribution of the security function
|
||
may be haphazard, based on chance. Ideally, the structure of a
|
||
security program should result from the implementation of a
|
||
planned and integrated management philosophy.
|
||
|
||
Figure 1. shows a management structure based on that of an actual
|
||
federal agency. The agency consists of five major units, each
|
||
with several large computer facilities. Each facility runs
|
||
multiple applications. This type of organization needs to manage
|
||
security at the agency level, the unit level, the computer
|
||
facility level, and the application level.
|
||
|
||
Managing computer security at multiple levels brings many
|
||
benefits. Each level contributes to the overall security program
|
||
with different types of expertise, authority, and resources. In
|
||
general, the higher levels (such as the headquarters or unit
|
||
levels) better understand the organization as a whole, exercise
|
||
more authority, set policy, and enforce compliance with
|
||
applicable policies and procedures. On the other hand, the
|
||
systems levels (such as the computer facility and applications
|
||
levels) know the technical and procedural requirements and
|
||
problems. The levels of security program management are
|
||
complementary; each helps the other be more effective.
|
||
|
||
Most organizations have at least two levels of security
|
||
management. The central security program addresses the overall
|
||
management of security within the organization or a major
|
||
component of the organization, including such activities as
|
||
policy development and oversight. The system level security
|
||
program focuses on the management of security for a particular
|
||
information processing system. This function includes activities
|
||
such as selecting and installing safeguards and may be performed
|
||
by users, functional managers, or computer systems personnel.
|
||
|
||
Central Security Program
|
||
A central security program which manages or coordinates the use
|
||
of security-related resources across the entire organization
|
||
provides these benefits:
|
||
|
||
Efficiency and Economy
|
||
A central program can disseminate security-related information
|
||
throughout the agency in an efficient and cost-effective manner.
|
||
Information to be shared includes policies, regulations,
|
||
standards, training opportunities, and security incident reports.
|
||
Internal security-related information, such as procedures which
|
||
worked or did not work, virus infections, security problems and
|
||
solutions also should be shared within an organization. Often
|
||
these issues are specific to the operating environment and
|
||
culture of the organization.
|
||
|
||
Another use of an organization-wide conduit of information is the
|
||
increased ability to influence external and internal policy
|
||
decisions. A central security program office which speaks for
|
||
the entire organization is more likely to be listened to by upper
|
||
management and external organizations.
|
||
|
||
Also the central organization can share information with external
|
||
groups as illustrated in Figure 2. Since external interaction
|
||
occurs at both the organization and system levels, a central
|
||
security organization should be aware of the interactions at the
|
||
system level to exploit all important sources.
|
||
|
||
Sources of Security Information
|
||
NIST: Federal Information Processing Standards (FIPS), NIST
|
||
Publication List 91, Computer Security Publications,
|
||
and the NIST Computer Security BBS.
|
||
GSA: Federal Information Resources Management Regulation
|
||
(FIRMR) Parts 201-20 and 201-39.
|
||
OMB: OMB Circular A-130, Management of Federal Information
|
||
Resources, June 25, 1993
|
||
FIRST: Forum of Incident Response and Security Teams for
|
||
security incident-related information.
|
||
|
||
The central security program assists the organization in spending
|
||
its scarce security dollars more efficiently. Such organizations
|
||
can develop expertise and share it, reducing the need to contract
|
||
out repeatedly for similar services, such as contingency planning
|
||
or risk analysis. The expertise can be resident in the central
|
||
security program or distributed throughout the system-level
|
||
programs. Another advantage of a centralized program is its
|
||
ability to negotiate discounts based on volume purchasing of
|
||
security hardware and software.
|
||
|
||
Oversight
|
||
A central security program serves as an independent evaluation or
|
||
enforcement function to ensure that organizational subunits
|
||
secure resources cost-effectively and follow applicable policy.
|
||
With a central oversight function, organizations can take
|
||
responsibility for their own security programs, identify and
|
||
correct problems before they become major concerns, and avoid
|
||
external investigations and audits.
|
||
|
||
Elements of a Central Security Program
|
||
|
||
A program manager should be selected as the information
|
||
technology (IT) security program manager. The program should be
|
||
staffed with able personnel and linked to the program management
|
||
function and IT security personnel in other parts of the
|
||
organization. The security program requires a stable base in
|
||
terms of personnel, funding, and other support. Additionally,
|
||
the benefits of an oversight function cannot be achieved if the
|
||
security program is not recognized within an organization as
|
||
having expertise and authority.
|
||
|
||
To be effective, a central security program must be an
|
||
established part of organization management. If system managers
|
||
and applications owners do not consistently interact with the
|
||
security program, it becomes an empty token of upper management's
|
||
"commitment to security."
|
||
|
||
A security policy provides the foundation for the IT security
|
||
program and is the means for documenting and promulgating
|
||
important decisions about IT security. The central security
|
||
program should also publish standards, regulations, and
|
||
guidelines which implement and expand on policy.
|
||
|
||
A published mission and function statement grounds the IT
|
||
security program into the unique operating environment of the
|
||
organization. The statement should clearly establish the
|
||
function of the IT security program, define responsibilities for
|
||
the IT security program and other related programs and entities,
|
||
and provide the basis for evaluating the effectiveness of the IT
|
||
security program.
|
||
|
||
Long-term strategies should be developed to incorporate
|
||
security into the next generation of information technology.
|
||
Since the IT field moves rapidly, planning for future operating
|
||
environments is essential.
|
||
|
||
A compliance program enables the organization to assess
|
||
conformance with national and organization-specific policies and
|
||
requirements. National requirements include those prescribed
|
||
under the Computer Security Act of 1987, OMB Circular A-130,
|
||
Federal Information Resources Management Regulations (FIRMR), and
|
||
Federal Information Processing Standards (FIPS).
|
||
|
||
Liaisons should be established with internal groups including
|
||
the information resources management (IRM) office and traditional
|
||
security offices (such as personnel or physical security), other
|
||
offices such as Safety, Reliability, and Quality Assurance,
|
||
Internal Control, and the agency Inspector General. These
|
||
relationships facilitate integrating security into the management
|
||
of an organization. The relationships must be more than just
|
||
sharing information; the offices must influence each other to
|
||
assure that security is considered in agency plans for
|
||
information technology.
|
||
|
||
Liaisons should be established with external groups to take
|
||
advantage of external information sources and to improve the
|
||
dissemination of this information throughout the organization.
|
||
|
||
System Level Security Program
|
||
While a central security program addresses the entire spectrum of
|
||
information resources security for an organization, the system
|
||
level security programs implement security for each information
|
||
system. Functions include influencing decisions about controls
|
||
to implement, purchasing and installing technical controls,
|
||
administering day-to-day security, evaluating system
|
||
vulnerabilities, and responding to security problems.
|
||
|
||
The system security officer must raise security issues and help
|
||
to develop solutions. For example, has the data owner made clear
|
||
the security requirements of the system? Will bringing a new
|
||
function online impact security? Is the system vulnerable to
|
||
hackers and viruses? Has the contingency plan been tested?
|
||
Raising these kinds of questions forces system managers and data
|
||
owners to identify their security requirements and ensure that
|
||
they are met.
|
||
|
||
Characteristics of a Viable System Level Security Program
|
||
|
||
Security management should be integrated into the management
|
||
of the system to assure that system managers and data owners
|
||
consider security in the planning and operation of the system.
|
||
The system level security program manager should participate in
|
||
the selection and implementation of appropriate technical
|
||
controls and security procedures, understand system
|
||
vulnerabilities, and be able to respond quickly to system
|
||
security problems.
|
||
|
||
For large systems, such as a mainframe data center, the security
|
||
program often includes a manager and several staff positions in
|
||
such areas as access control, user administration, and
|
||
contingency and disaster recovery planning. For small systems,
|
||
such as an office-wide local area network (LAN), the security
|
||
program may be an adjunct responsibility of the LAN
|
||
administrator.
|
||
|
||
Security should be separated from operations. When the
|
||
security program is embedded in IT operations, the security
|
||
program often lacks independence, exercises minimal authority,
|
||
receives little management attention, and lacks resources. The
|
||
General Accounting Office (GAO) identified this organizational
|
||
mode as a principal basic weakness in federal agency IT security
|
||
programs (GAO Report LCD 78-123).
|
||
|
||
One approach to the conflict between needs for management and
|
||
independence is a link between the security program and upper
|
||
management through the central security program. Another
|
||
arrangement is the complete independence of the security program
|
||
from system management, with the security program reporting
|
||
directly to higher management. Many hybrid alignments exist,
|
||
such as co-location of the staff but separate reporting and
|
||
supervisory structures.
|
||
|
||
The development of system security plans by system level
|
||
security personnel is a natural choice, as this staff knows the
|
||
system thoroughly and can document weaknesses and solutions.
|
||
Computer security and privacy plans for sensitive systems are
|
||
mandated by the Computer Security Act of 1987.
|
||
|
||
Summary
|
||
Organizations, large and small, need to establish a computer
|
||
security policy and program that integrates central office and
|
||
system level security efforts, is supported by top management,
|
||
and is publicized to all employees of the agency. Central and
|
||
system level security programs must work together to achieve the
|
||
common goal of protecting an organization's vital information
|
||
resources.
|
||
|
||
|