Cybersecurity and Third-Party Risk. Gregory C. Rasner
Чтение книги онлайн.

Читать онлайн книгу Cybersecurity and Third-Party Risk - Gregory C. Rasner страница 18

СКАЧАТЬ of a security incident. This detection must be timely. Monitoring capabilities must be continuously implemented in order to find and identify anomalous events to catch malicious or suspicious behavior. When we think of an organization's cyber operations teams defending against hackers, we typically think of them as being in detection mode. Some of the capabilities used to detect are Security Information and Event Management (SIEM), Data Loss Prevention (DLP), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and the other tools, which are focused on this detection activity.

      The Respond function ensures that correct actions are taken when a cybersecurity event is detected. Such activity ensures that cyber Incident Response plans are executed according to an organization's previously established processes. All work done to analyze and support recovery work is performed in a timely manner, and corrective activities are carried out to contain the incident and close the issue.

      The Recover function acknowledges any impact, then prioritizes the restoration of services or capabilities in a timely manner to further reduce the event's impact. The execution of a recovery plan as it's designed and implemented ensures the restoration of an organization's systems. A “lessons learned” meeting, or what may be known as a post‐mortem on the incident, must occur to determine if any changes are required in the organization's existing plans. Communications—both inbound and outbound—are coordinated during and post recovery from the event.

      The ISO 27001 cybersecurity framework is an international standard that states a risk‐based process requires an adopting organization to incorporate measures for detecting security threats to information systems. ISO 27001 has a total of 114 controls that are categorized into 14 categories (with the number of controls):

       Information Security Policies (2 controls)

       Information Security Organization (7 controls)

       Human Resources Security (6 controls)

       Asset Management (10 controls)

       Access Controls (14 controls)

       Cryptography (2 controls)

       Physical and Environmental Security (15 controls)

       Operations Security (14 controls)

       Communications Security (7 controls)

       Systems Acquisition, Development, and Maintenance (13 controls)

       Supplier Relationships (5 controls)

       Information Security Incident Management (7 controls)

       Business Continuity Management (4 controls)

       Compliance (8 controls)

      NIST 800‐53 was created to enable government agencies to have effective cybersecurity controls. This framework specifically describes the requirements for federal government agencies to protect data and information systems. It has over 900 security requirements, which makes it very complex for an organization to implement. The number of requirements and the mandates required to enforce the compliance are focused primarily on any company whose systems interact with a federal agency information system. Also because of this complexity, unless the company is required to follow NIST 800‐53, most private companies will adhere to NIST‐CSF.

      The New York Department of Financial Services (NYDFS) framework is a cybersecurity framework that covers nearly any entity performing financial services through the state of New York. The framework originates from NYDFS Cybersecurity Regulation (23 NYCRR 500) and “is designed to promote the protection of customer information as well as the information technology systems or regulated entities.” It requires companies to conduct risk assessments and to implement a program with security controls that detects and responds to cyber events.

      The covered entity, a financial institution, must implement the following six items:

      1 A risk assessment must be conducted periodically to assess the Confidentiality, Integrity and Availability of information systems and protected data.

      2 An audit trail must record and respond to security incidents and be maintained for five years.

      3 Limits on data retention must be set in place to ensure that data is disposed of properly when no longer needed.

      4 Access Privileges must be implemented and limited to protected data, and access records must be periodically reviewed.

      5 An Incident Response plan must be published to ensure that cybersecurity events are clearly communicated, roles and responsibilities are clear, and remediation takes place.

      6 Notices to the superintendent (the superintendent is the organization that oversees the regulation) must be provided within 72 hours after a “material” cybersecurity event is detected.

      NYDFS is similar to the General Data Protection Regulation (GDPR) and the California Privacy Protection, which have outsized power due to their economic size. Much of the world's finance flows through New York, and so many world finance companies are subjected to this framework. More importantly for this book, the NYDFS has a part that requires covered entities (i.e., those subject to the regulation) to perform due diligence on their third parties at regular intervals.

      The Federal Information Systems Management Act (FISMA) is a framework for federal agencies. This standard defines a set of security requirements that the agencies use to improve their cybersecurity. The benchmark requires that third parties to an agency conform to their information security requirements. It contains nine steps for securing government data, operations, and assets:

      1 Defining the information categories for security levels

      2 Understanding the minimum security controls for protecting data

      3 Refining controls through risk assessments

      4 Documenting controls and developing security plans

      5 Implementing the required security controls

      6 Evaluating the effectiveness of implemented controls

      7 Establishing security risks for federal resources and data

      8 Authorizing the use of secure information systems

      9 Continuously monitoring the implemented controls

      Several other frameworks are СКАЧАТЬ