Protecting the Crown Jewels: Executive Summary - Information [PDF]

Mission-critical information assets – an organisation's “crown jewels” – are information assets of greatest valu

0 downloads 6 Views 1MB Size

Recommend Stories


Protecting the Crown Jewels
You have survived, EVERY SINGLE bad day so far. Anonymous

Sweden's Crown Jewels Nabbed!
Everything in the universe is within you. Ask all from yourself. Rumi

Take Home the ODS Crown Jewels
Before you speak, let your words pass through three gates: Is it true? Is it necessary? Is it kind?

Executive summary (PDF)
Never let your sense of morals prevent you from doing what is right. Isaac Asimov

Executive Summary (PDF)
Don’t grieve. Anything you lose comes round in another form. Rumi

Executive Summary Operational Summary
If your life's work can be accomplished in your lifetime, you're not thinking big enough. Wes Jacks

executive summary
We must be willing to let go of the life we have planned, so as to have the life that is waiting for

Executive summary
Knock, And He'll open the door. Vanish, And He'll make you shine like the sun. Fall, And He'll raise

Executive Summary
Silence is the language of God, all else is poor translation. Rumi

Executive Summary
Raise your words, not voice. It is rain that grows flowers, not thunder. Rumi

Idea Transcript


PROTECTING THE CROWN JEWELS HOW TO SECURE MISSION-CRITICAL INFORMATION ASSETS The digital revolution continues apace, with organisations and individuals immersed in the “Information Age”. Today, valuable information is used to compete and succeed in a global market; information assets can represent more than 80%1 of an organisation’s total value. Mission-critical information assets – an organisation’s “crown jewels” – are information assets of greatest value and would cause major business impact if compromised. These assets attract the attention of highly motivated, capable and well-funded adversarial threats, such as unscrupulous competitors, nation states and organised criminal groups, all of whom are intent on exploiting this valuable information. Businesses must prioritise the protection of mission-critical information assets. All too often leaders consider the value of mission-critical information assets but fail to recognise the extent to which these assets are exposed to threats. Organisations that recognise both the value of, and the risks to, mission-critical information assets will be best positioned to take advantage of the ISF Protection Process to deliver comprehensive, balanced and end-to-end protection.

PROTECTING THE CROWN JEWELS – HOW TO SECURE MISSION-CRITICAL INFORMATION ASSETS Conventional approaches to deploying security controls seldom provide appropriate or sufficient protection for mission-critical information assets. The ISF Protection Process is a structured and systematic five-phase process for determining the approaches required to deliver comprehensive, balanced and end-to-end protection.

TH E I S F P ROT EC T ION P ROCES S

A IDENTIFY MISSION-CRITICAL INFORMATION ASSETS

E

PROTECT THE INFORMATION LIFE CYCLE − Apply fundamental, enhanced and specialised controls throughout the information life cycle

‒‒Define what constitutes a mission-critical information asset ‒‒Identify potential mission-critical information assets based on their value to the organisation and the potential business impact if compromised ‒‒Maintain a record of approved mission-critical information assets

A

IDENTIFY

mission-critical information assets

B ASSESS THE MAIN

Process

Create

ADVERSARIAL THREATS

Transmit

‒‒Investigate the main adversarial threats to mission-critical information assets ‒‒Identify threat events likely to be used to target missioncritical information assets ‒‒Evaluate the level of exposure to each mission-critical information asset

A SSESS

PROTECTION CAPABILITY

PROTECTION APPROACHES

C

‒‒Understand possible approaches for protecting mission-critical information assets ‒‒Define objectives for protecting mission-critical information assets ‒‒Select the required approaches to protect mission-critical information assets ‒‒Identify the security controls and solutions required to support chosen protection approaches

D COUNTER THE MAIN

− Deliver the appropriate extra layers of preventative and detective security controls across the five stages of the cyber attack chain Gaining Access

Maintaining Control

DETERMINE

the required protection approaches

Set direction for security, promote ownership, collaborate with stakeholders.

People Invest in skilled and experienced IT practitioners, security specialists and risk experts.

D

the main adversarial threats

Compromising Information

E

P ROTEC T

the information life cycle

Governance, Risk Management and Compliance

Technology Automate protection of mission-critical information assets using security architecture, specialised technical security controls and advanced security solutions.

Security Assurance

Exploiting Information

Provide assurance for the protection of missioncritical information assets.

P ROT EC T I O N C A PA B I L I T Y

Threat-based protection provides an early warning system to inform of emerging or imminent threat events, enabling a balanced set of end-to-end controls to counter the main adversarial threats.

The ISF Protection Process can be used in isolation or embedded into the broader protection capability of an organisation. This capability consists of a range of different supporting elements, typically comprising: governance, risk management and compliance (GRC); people; technology; and security assurance.

GRC

CO U NT E R

ADVERSARIAL THREATS

Store

Protecting mission-critical information assets throughout their life cycle reduces potential gaps and underpins comprehensive and end-to-end protection.

B

the main adversarial threats

C DETERMINE THE REQUIRED

Performing Reconnaissance

Destroy

People

The protection capability builds on a solid foundation provided by The Standard of Good Practice for Information Security.

The

STANDARD

WHERE NEXT? The ISF series for Protecting the Crown Jewels enables organisations to protect their mission-critical information assets against highly motivated, capable and well-funded adversarial threats. The series incorporates: ‒‒ a main report targeted primarily at CISOs and business leaders, introducing mission-critical information assets, outlining the main adversarial threats and presenting the ISF Protection Process ‒‒ an Implementation Guide and other supporting materials targeted at information risk specialists and information security professionals, providing practical steps to implement and embed the ISF Protection Process. Organisations should give careful consideration to the ISF resources in this series including The Standard of Good Practice for Information Security, Benchmark and IRAM2: The next generation of assessing information risk. The ISF encourages collaboration on its research and tools. Members are invited to join the vibrant Protecting the Crown Jewels community on ISF Live (https://www.isflive.org/community/risk/protecting-the-crown-jewels) to share their experience and discuss the findings and recommendations presented in this ISF series. Consultancy services from the ISF provide Members and Non-Members with the opportunity to purchase short-term, professional support activities to supplement the implementation of ISF products including the ISF Protection Process and other resources in this ISF series. Protecting the Crown Jewels is available free of charge to Members, and can be downloaded from the Member website www.isflive.org. Non-Members interested in purchasing the series should contact Steve Durbin.

CONTACT For further information contact: Steve Durbin, Managing Director US Tel: +1 (347) 767 6772 UK Tel: +44 (0)20 3289 5884 UK Mobile: +44 (0)7785 953 800 Email: [email protected] Web: www.securityforum.org

ABOUT THE ISF Founded in 1989, the Information Security Forum (ISF) is an independent, not-for-profit association of leading organisations from around the world. It is dedicated to investigating, clarifying and resolving key issues in cyber, information security and risk management by developing best practice methodologies, processes and solutions that meet the business needs of its Members. ISF Members benefit from harnessing and sharing in-depth knowledge and practical experience drawn from within their organisations and developed through an extensive research and work programme. The ISF provides a confidential forum and framework, which ensures that Members adopt leading-edge information security strategies and solutions. And by working together, Members avoid the major expenditure required to reach the same goals on their own.

DISCLAIMER This document has been published to provide general information only. It is not intended to provide advice of any kind. Neither the Information Security Forum nor the Information Security Forum Limited accept any responsibility for the consequences of any use you make of the information contained in this document.

1 Ocean Tomo, "Ocean Tomo releases 2015 annual study of intangible asset market value", http://www.oceantomo.com/blog/2015/03-05-ocean-tomo-2015-intangible-asset-market-value/

Reference: ISF 02 08 16 | Copyright © 2016 Information Security Forum Limited | Classification: Public, no restrictions

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.