Preface |
|
xi | |
|
1 Why Cybersecurity Management Is Important |
|
|
1 | (26) |
|
Computing and Culture Shock |
|
|
1 | (21) |
|
Six Blind Men and an Elephant |
|
|
3 | (2) |
|
|
5 | (1) |
|
The Growing Pains of an Emerging Discipline |
|
|
5 | (3) |
|
Understanding the Costs and Benefits to an Organization |
|
|
8 | (2) |
|
Two Absolute Rules for Cybersecurity Work |
|
|
10 | (1) |
|
Why Complete Protection Is Important |
|
|
10 | (1) |
|
The Problem of Diversity and Dispersion |
|
|
11 | (1) |
|
Introduction: Why Formal Organizational Control Is Crucial |
|
|
12 | (2) |
|
Implementing a Strategic Response |
|
|
14 | (2) |
|
Frameworks for Ensuring Due Care |
|
|
16 | (3) |
|
|
19 | (2) |
|
Monitoring and Accounting for Control Status |
|
|
21 | (1) |
|
|
22 | (2) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (2) |
|
2 Control-Based Information Governance, What It Is and How It Works |
|
|
27 | (42) |
|
The Value of Formal Control |
|
|
27 | (33) |
|
Governance Infrastructures |
|
|
28 | (2) |
|
Organizing Things into a Rational Process |
|
|
30 | (1) |
|
|
31 | (3) |
|
Control Framework Assumptions |
|
|
34 | (2) |
|
Introduction: The Problem |
|
|
36 | (4) |
|
Information Audit and Control |
|
|
40 | (2) |
|
Reasons for Conducting an Audit |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
44 | (6) |
|
Auditing and Validating a Control Infrastructure for a Business |
|
|
50 | (1) |
|
Overview of the Auditing Process |
|
|
51 | (3) |
|
|
54 | (1) |
|
Reporting Problems with Controls: Deficiencies and Weaknesses |
|
|
55 | (1) |
|
|
56 | (4) |
|
|
60 | (6) |
|
|
61 | (1) |
|
|
62 | (2) |
|
Conducting an Audit Process |
|
|
64 | (2) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (2) |
|
3 A Survey of Control Frameworks, General Structure, and Application |
|
|
69 | (38) |
|
What Is Information Security Governance? |
|
|
70 | (3) |
|
IT Governance Frameworks---An Overview |
|
|
73 | (18) |
|
|
73 | (2) |
|
IT Infrastructure Library Framework |
|
|
75 | (2) |
|
|
77 | (2) |
|
|
79 | (1) |
|
National Institute of Standards and Technology |
|
|
80 | (4) |
|
Cybersecurity Framework---Improving Critical Infrastructure Cybersecurity |
|
|
84 | (2) |
|
Information Security Forum Standard of Good Practice for Information Security |
|
|
86 | (2) |
|
Payment Card Industry Data Security Standards |
|
|
88 | (3) |
|
|
91 | (1) |
|
|
91 | (11) |
|
Security Control Organization |
|
|
94 | (8) |
|
|
102 | (2) |
|
|
104 | (1) |
|
|
105 | (2) |
|
4 What Are Controls and Why Are They Important? |
|
|
107 | (40) |
|
Picking Up Where Chapter 1 Left Off |
|
|
108 | (1) |
|
Goal-Based Security Controls |
|
|
109 | (6) |
|
|
110 | (1) |
|
|
111 | (1) |
|
Comparing Detection and Prevention Controls |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
113 | (1) |
|
Compensating Security Controls |
|
|
113 | (1) |
|
|
113 | (2) |
|
Implementation-Based Security Controls |
|
|
115 | (5) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
117 | (1) |
|
Combining Implementation with Goals |
|
|
117 | (1) |
|
Tying Security Controls to Architecture |
|
|
117 | (3) |
|
The Security Control Formulation and Development Process |
|
|
120 | (9) |
|
|
120 | (2) |
|
Identifying Information Types |
|
|
122 | (1) |
|
Categorization of Information Types |
|
|
122 | (1) |
|
Categorization of Information Systems |
|
|
123 | (1) |
|
Description of the Information Systems |
|
|
124 | (1) |
|
Selection of Security Controls |
|
|
124 | (1) |
|
Identification of Common Controls |
|
|
125 | (1) |
|
Formal Security Control Selection |
|
|
126 | (2) |
|
Milestone: Completion of the Security Plan |
|
|
128 | (1) |
|
Implementing Security Controls |
|
|
128 | (1) |
|
Setting the Stage for Control Implementation through Security Architecture Design |
|
|
129 | (14) |
|
Control Implementation through Security Engineering |
|
|
130 | (1) |
|
Security Control Documentation |
|
|
131 | (1) |
|
Security Control Assessment |
|
|
132 | (2) |
|
Components of Security Control Assessment |
|
|
134 | (1) |
|
Conducting Security Control Assessment |
|
|
135 | (1) |
|
Authorizing Security Controls |
|
|
136 | (1) |
|
|
137 | (1) |
|
Monitoring Security Controls |
|
|
138 | (1) |
|
Monitor the System and Environmental Change |
|
|
139 | (1) |
|
Conduct Continuous Security Control Assessment |
|
|
140 | (1) |
|
Conduct Continuous Remediation Activities |
|
|
141 | (1) |
|
Continuously Update the Security Plan and Risk Management Strategy |
|
|
141 | (1) |
|
Provide Adequate Security Status Reporting |
|
|
141 | (1) |
|
Conduct Ongoing Risk Assessments |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
145 | (2) |
|
5 Implementing a Multitiered Governance and Control Framework in a Business |
|
|
147 | (34) |
|
Constructing Practical Systems of Controls |
|
|
147 | (19) |
|
Making Information Governance Tangible |
|
|
148 | (2) |
|
|
150 | (1) |
|
The Process of Defining and Implementing Security Controls |
|
|
151 | (2) |
|
Establishing the Management System |
|
|
153 | (2) |
|
Standard Security Principles Derived from Standards |
|
|
155 | (7) |
|
Building the Security Control System |
|
|
162 | (1) |
|
Initial Setup and Tradeoffs |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
Preliminary Control Baseline |
|
|
163 | (1) |
|
|
163 | (1) |
|
Selection of Final Control Set |
|
|
164 | (1) |
|
Refinement of the Control Baseline |
|
|
164 | (1) |
|
|
164 | (2) |
|
Practical Implementation: How to Establish a Real, Working Control Framework |
|
|
166 | (7) |
|
Ensuring Long-Term Control Capability |
|
|
173 | (1) |
|
|
174 | (4) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (2) |
|
6 Risk Management and Prioritization Using a Control Perspective |
|
|
181 | (32) |
|
Ensuring that Risk Management Process Supports the Organization |
|
|
181 | (2) |
|
Five Elements of the Risk Management Process |
|
|
183 | (24) |
|
How the Risk Management Plan Uses the Risk Profile |
|
|
187 | (1) |
|
Conducting a Risk Assessment in Support of Planning |
|
|
188 | (1) |
|
Implementing a Managed Risk Control Process |
|
|
189 | (2) |
|
Generic Approaches to Risk |
|
|
191 | (1) |
|
Planning for Effective Risk Management |
|
|
192 | (2) |
|
Sensitivity of the Information versus Rigor of the Controls |
|
|
194 | (2) |
|
Writing the Risk Management Plan |
|
|
196 | (1) |
|
Coordinated Approach to Risk Management |
|
|
196 | (2) |
|
Ensuring an Effective Set of Risk Controls |
|
|
198 | (1) |
|
|
199 | (1) |
|
Control Types: Management Controls |
|
|
199 | (1) |
|
Control Types: Technical Controls |
|
|
200 | (1) |
|
Practical Steps to Implement a Security Control |
|
|
200 | (2) |
|
Modeling Risks for Prioritization |
|
|
202 | (1) |
|
Risk Management and Operational Evaluation of Change |
|
|
203 | (1) |
|
Evaluating the Overall Policy Guidance |
|
|
204 | (1) |
|
Program Management Reviews |
|
|
205 | (2) |
|
|
207 | (3) |
|
|
210 | (1) |
|
|
211 | (2) |
|
7 Control Formulation and Implementation Process |
|
|
213 | (36) |
|
The Control Formulation Process |
|
|
213 | (6) |
|
|
216 | (1) |
|
Standard Control Requirements |
|
|
217 | (2) |
|
Creating and Documenting Control Objectives |
|
|
219 | (2) |
|
Creating a Management-Level Control Process |
|
|
221 | (6) |
|
Assessing Control Performance |
|
|
227 | (1) |
|
Measurement-Based Assurance of Controls |
|
|
228 | (5) |
|
Assessing and Remediating the Control Environment |
|
|
233 | (3) |
|
Developing a Comprehensive ICT Security Control Program |
|
|
236 | (6) |
|
Explicitly Controlling ICT Work |
|
|
238 | (1) |
|
Assessing the Adequacy of ICT Controls |
|
|
239 | (1) |
|
Dealing with Control Risks |
|
|
240 | (2) |
|
|
242 | (4) |
|
|
246 | (1) |
|
|
247 | (2) |
|
8 Security Control Validation and Verification |
|
|
249 | (34) |
|
Security Control Assessment Fundamentals |
|
|
251 | (6) |
|
Fitting Security Control Assessment within the SDLC |
|
|
252 | (2) |
|
Adequate Control Implementation: The Proof Is in the Pudding |
|
|
254 | (1) |
|
Security Control Validation and Verification Procedures and Methodologies |
|
|
255 | (2) |
|
NIST Security Control Assessment Process |
|
|
257 | (9) |
|
Task 1 Preparing for Security and Privacy Control Assessments |
|
|
257 | (5) |
|
Task 2 Developing Security and Privacy Assessment Plans |
|
|
262 | (2) |
|
Task 3 Conducting Security and Privacy Assessments |
|
|
264 | (1) |
|
Task 4 Analyzing Assessment Reports |
|
|
265 | (1) |
|
Control Testing and Examination Application |
|
|
266 | (13) |
|
Distinguishing between Testing and Examination |
|
|
266 | (1) |
|
Common Types of Operational and Technical Security Tests |
|
|
267 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
Common Operational and Technical Security Examination Techniques |
|
|
271 | (2) |
|
|
273 | (1) |
|
|
274 | (1) |
|
|
275 | (1) |
|
System Configuration Review |
|
|
276 | (1) |
|
|
277 | (1) |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
280 | (1) |
|
|
281 | (2) |
|
9 Control Framework Sustainment and Security of Operations |
|
|
283 | (34) |
|
Operational Control Assurance: Aligning Purpose with Practice |
|
|
283 | (5) |
|
Ensuring the Long-Term Integrity of the Control Set |
|
|
285 | (3) |
|
Operational Assurance (Sensing) |
|
|
288 | (4) |
|
|
292 | (3) |
|
|
294 | (1) |
|
Response Management (Responding) |
|
|
295 | (7) |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
298 | (2) |
|
Change Reintegration into the Operational Environment |
|
|
300 | (1) |
|
|
300 | (1) |
|
Recertification and Accreditation of Change |
|
|
301 | (1) |
|
Secure Migration or Retirement of a Control System |
|
|
302 | (1) |
|
Operational Oversight and Infrastructure Assurance of Control Set Integrity |
|
|
302 | (10) |
|
|
303 | (2) |
|
Planning---Establishing the Routine Control Operations Process |
|
|
305 | (5) |
|
Rationally Managing the Configuration of the Control Set |
|
|
310 | (2) |
|
|
312 | (2) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
315 | (2) |
Index |
|
317 | |