Chapter 1 Introduction |
|
1 | (4) |
Chapter 2 Evolution of Information Security |
|
5 | (40) |
|
|
5 | (1) |
|
Distributed Systems and the Internet |
|
|
5 | (1) |
|
Business-to-Business (B2B) Relationships |
|
|
6 | (1) |
|
|
6 | (1) |
|
Enterprise Resource Planning (ERP) |
|
|
7 | (2) |
|
Information Security Today |
|
|
9 | (1) |
|
Why Protect Information Assets? |
|
|
9 | (6) |
|
The Internet and the Availability and Accessibility of Information |
|
|
10 | (1) |
|
Shift from Paper-Based to Electronic-Based Information |
|
|
11 | (1) |
|
|
11 | (2) |
|
|
13 | (1) |
|
|
14 | (1) |
|
Growing Role of Internal Audit |
|
|
15 | (1) |
|
|
16 | (7) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
19 | (4) |
|
Better Business Bureau (BBB) Online Privacy Seal |
|
|
19 | (2) |
|
AICPA/CICA WebTrust Program |
|
|
21 | (2) |
|
|
23 | (6) |
|
Rise of the Chief Security Officer |
|
|
24 | (3) |
|
Autonomous Departments Devoted to Information Security |
|
|
27 | (2) |
|
Independence and the Ability to Escalate |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (5) |
|
Vendor-Neutral Certifications |
|
|
30 | (4) |
|
Certified Information Systems Security Professional (CISSP) |
|
|
30 | (2) |
|
Certified Information Systems Auditor (CISA) |
|
|
32 | (1) |
|
System Administration and Network Security Certifications (SANS) - GIAC (Global Information Assurance Certification) |
|
|
33 | (1) |
|
CISM (Certified Information Security Manager) |
|
|
33 | (1) |
|
Vendor-Specific Certifications |
|
|
34 | (1) |
|
Trends in Information Security |
|
|
34 | (8) |
|
Focus on the Overall Information Security Program |
|
|
35 | (2) |
|
Security Spending Is Tightening |
|
|
37 | (1) |
|
Growing Awareness of Information Security |
|
|
38 | (1) |
|
Outsourcing Security Functions |
|
|
38 | (4) |
|
|
42 | (1) |
|
|
42 | (3) |
Chapter 3 The Information Security Program and How a Security Assessment Fits In |
|
45 | (22) |
|
What Is an Information Security Program? |
|
|
45 | (10) |
|
|
45 | (2) |
|
Security Policies and Procedures |
|
|
47 | (2) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
51 | (2) |
|
|
53 | (1) |
|
|
54 | (1) |
|
How Does a Security Assessment Fit In? |
|
|
55 | (3) |
|
Why Conduct a Security Assessment? |
|
|
58 | (4) |
|
Obtaining an Independent View of Security |
|
|
58 | (1) |
|
Managing Security Risks Proactively |
|
|
59 | (1) |
|
Determining Measures to Take to Address Any Regulatory Concerns |
|
|
60 | (1) |
|
|
61 | (1) |
|
The Security Assessment Process |
|
|
62 | (3) |
|
|
65 | (2) |
Chapter 4 Planning |
|
67 | (36) |
|
|
67 | (20) |
|
|
69 | (5) |
|
Proactive Approach to Security |
|
|
70 | (1) |
|
|
70 | (1) |
|
Justification for Additional Funds for Information Security Initiatives |
|
|
71 | (1) |
|
Security Incident Has Occurred |
|
|
71 | (1) |
|
|
72 | (1) |
|
Changes in the IT Environment |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
74 | (5) |
|
|
76 | (1) |
|
|
77 | (2) |
|
|
79 | (3) |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (2) |
|
|
82 | (1) |
|
|
83 | (11) |
|
|
83 | (1) |
|
|
84 | (3) |
|
|
87 | (5) |
|
|
92 | (2) |
|
|
94 | (6) |
|
Understanding the Meaning of a Security Assessment |
|
|
94 | (3) |
|
|
97 | (3) |
|
|
97 | (1) |
|
|
98 | (2) |
|
|
100 | (2) |
|
|
100 | (1) |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
Chapter 5 Initial Information Gathering |
|
103 | (36) |
|
Benefits of Initial Preparation |
|
|
103 | (2) |
|
Credibility with the Customer |
|
|
103 | (1) |
|
Ability to Ask the Right Questions |
|
|
104 | (1) |
|
Gather Publicly Available Information |
|
|
105 | (1) |
|
Where Is This Information Found? |
|
|
105 | (12) |
|
|
107 | (4) |
|
|
107 | (1) |
|
Operations-Related Information |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
Sense of Dependency on the Web Presence |
|
|
110 | (1) |
|
|
111 | (5) |
|
|
111 | (4) |
|
Form 10Q - Quarterly Report |
|
|
115 | (1) |
|
Form 8K - Report of Unscheduled Material Events |
|
|
115 | (1) |
|
|
116 | (1) |
|
Other Articles on the Internet |
|
|
117 | (1) |
|
Gather Information from the Client |
|
|
117 | (6) |
|
Analyze Gathered Information |
|
|
123 | (1) |
|
Prepare Initial Question Sets |
|
|
123 | (11) |
|
Business Process-Related Questions |
|
|
125 | (7) |
|
Significant Business Processes and Supporting Technologies |
|
|
126 | (3) |
|
Integration Points with Other Departments |
|
|
129 | (1) |
|
|
130 | (2) |
|
|
132 | (1) |
|
Other Interviewee-Specific Questions |
|
|
132 | (1) |
|
Traditional Security-Related Questions |
|
|
132 | (2) |
|
Develop and Document Template for Final Report |
|
|
134 | (2) |
|
|
136 | (3) |
|
Gather Publicly Available Information |
|
|
137 | (1) |
|
Gather Information Using an Initial Questionnaire |
|
|
137 | (1) |
|
|
137 | (1) |
|
Prepare Initial Question Sets |
|
|
138 | (1) |
|
Develop and Document Template for Final Report |
|
|
138 | (1) |
Chapter 6 Business Process Evaluation |
|
139 | (26) |
|
General Review of Company and Key Business Processes |
|
|
142 | (9) |
|
Critical Business Processes |
|
|
145 | (2) |
|
|
147 | (1) |
|
Planned Changes That May Impact Security |
|
|
148 | (1) |
|
|
148 | (3) |
|
Management Concerns Regarding Information Security |
|
|
151 | (1) |
|
Finalize Question Sets for Process Reviews |
|
|
151 | (3) |
|
Meet with Business Process Owners |
|
|
154 | (2) |
|
|
154 | (1) |
|
Interviews with Process Owners |
|
|
154 | (2) |
|
|
156 | (1) |
|
Analyze Information Collected and Document Findings |
|
|
156 | (2) |
|
Status Meeting with Client |
|
|
158 | (3) |
|
|
160 | (1) |
|
Status Based on Project Plan |
|
|
160 | (1) |
|
Discussion of Critical Technologies |
|
|
160 | (1) |
|
Potential Concerns During This Phase |
|
|
161 | (1) |
|
|
162 | (3) |
Chapter 7 Technology Evaluation |
|
165 | (28) |
|
General Review of Technology and Related Documentation |
|
|
166 | (4) |
|
Develop Question Sets for Technology Reviews |
|
|
170 | (4) |
|
Meet with Technology Owners and Conduct Detailed Testing |
|
|
174 | (13) |
|
|
176 | (1) |
|
|
177 | (7) |
|
Reasons for Conducting Detailed Testing |
|
|
177 | (3) |
|
Test Planning and Related Considerations |
|
|
180 | (1) |
|
Manual vs. Automated Testing |
|
|
181 | (1) |
|
|
182 | (1) |
|
Process for Conducting Detailed Technology Testing |
|
|
183 | (1) |
|
Common Detailed Technology Testing |
|
|
184 | (3) |
|
Analyze Information Collected and Document Findings |
|
|
187 | (2) |
|
Status Meeting with Client |
|
|
189 | (1) |
|
Potential Concerns During This Phase |
|
|
189 | (2) |
|
|
191 | (2) |
Chapter 8 Risk Analysis and Final Presentation |
|
193 | (36) |
|
Risk Analysis and Risk Score Calculation |
|
|
193 | (12) |
|
|
197 | (8) |
|
|
198 | (2) |
|
Calculation of Business Impact |
|
|
200 | (1) |
|
Analysis of Business Impact |
|
|
200 | (1) |
|
|
200 | (1) |
|
Potential Impact to the Business - Medium |
|
|
201 | (1) |
|
|
201 | (3) |
|
Determination of Risk Score |
|
|
204 | (1) |
|
Finalize Findings and Risks |
|
|
205 | (5) |
|
Finalize Wording for Findings |
|
|
205 | (4) |
|
Document Risks and Criticality |
|
|
209 | (1) |
|
Develop Recommendations and Prepare Draft Report |
|
|
210 | (12) |
|
Develop and Document Recommendations |
|
|
212 | (2) |
|
Characteristics of Good Recommendations |
|
|
214 | (4) |
|
|
214 | (1) |
|
|
215 | (1) |
|
Cost Effectiveness (Return on Security Investment) |
|
|
215 | (3) |
|
Other General Recommendations |
|
|
218 | (11) |
|
|
219 | (1) |
|
Managed Security Services |
|
|
220 | (2) |
|
Discuss Draft Report with Client |
|
|
222 | (2) |
|
Present Final Report to Management |
|
|
224 | (2) |
|
Potential Concerns During This Phase |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
Chapter 9 Information Security Standards |
|
229 | (16) |
|
International Standards Organization 17799 (ISO 17799) |
|
|
229 | (3) |
|
Use in a Security Assessment |
|
|
232 | (1) |
|
|
232 | (2) |
|
Structure of the Common Criteria |
|
|
233 | (1) |
|
Use in a Security Assessment |
|
|
233 | (1) |
|
COBIT (Control Objectives for Information [ Related] Technology) |
|
|
234 | (4) |
|
|
234 | (4) |
|
IT Governance Self Assessment |
|
|
235 | (1) |
|
Management's IT Concern Diagnostic |
|
|
236 | (1) |
|
|
236 | (1) |
|
|
237 | (1) |
|
Use in a Security Assessment |
|
|
238 | (1) |
|
ITIL (IT Infrastructure Library) Security Management |
|
|
238 | (2) |
|
Use in a Security Assessment |
|
|
239 | (1) |
|
SAS (Statement on Auditing Standards) 70 |
|
|
239 | (1) |
|
Use in a Security Assessment |
|
|
240 | (1) |
|
|
240 | (1) |
|
Use in a Security Assessment |
|
|
240 | (1) |
|
|
241 | (1) |
|
Use in a Security Assessment |
|
|
241 | (1) |
|
RFC 2196 - Site Security Handbook |
|
|
241 | (1) |
|
Use in a Security Assessment |
|
|
242 | (1) |
|
|
242 | (1) |
|
SANS (SysAdmin, Audit, Network, Security)/FBI (Federal Bureau of Investigation) Top 20 List |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
243 | (2) |
Chapter 10 Information Security Legislation |
|
245 | (10) |
|
Relevance of Legislation in Security Assessments |
|
|
245 | (1) |
|
HIPAA (Health Insurance Portability and Accountability Act) |
|
|
246 | (2) |
|
GLBA (Gramm-Leach-Bliley Act) |
|
|
248 | (2) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
252 | (1) |
|
Federal Information Security Management Act (FIMSA) |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
254 | (1) |
Appendices Security Questionnaires and Checklists |
|
255 | (232) |
|
Appendix A Preliminary Checklist to Gather Information |
|
|
259 | (12) |
|
Appendix B Generic Questionnaire for Meetings with Business Process Owners |
|
|
271 | (6) |
|
Appendix C Generic Questionnaire for Meetings with Technology Owners |
|
|
277 | (6) |
|
Appendix D Data Classification |
|
|
283 | (8) |
|
Appendix E Data Retention |
|
|
291 | (6) |
|
Appendix F Backup and Recovery |
|
|
297 | (12) |
|
Appendix G Externally Hosted Services |
|
|
309 | (16) |
|
Appendix H Physical Security |
|
|
325 | (18) |
|
Appendix I Employee Termination |
|
|
343 | (8) |
|
Appendix J Incident Handling |
|
|
351 | (10) |
|
Appendix K Business to Business (B2B) |
|
|
361 | (10) |
|
Appendix L Business to Consumer (B2C) |
|
|
371 | (14) |
|
Appendix M Change Management |
|
|
385 | (6) |
|
Appendix N User ID Administration |
|
|
391 | (12) |
|
Appendix O Managed Security |
|
|
403 | (12) |
|
Appendix P Media Handling |
|
|
415 | (8) |
|
Appendix Q HIPAA Security |
|
|
423 | (64) |
Index |
|
487 | |