Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
Download
29547 views
1
2
3
4
5
GAO Accounting and Information Management Division
6
7
May 1998
8
Executive Guide
9
10
11
12
Information Security Management
13
14
Learning From Leading Organizations
15
16
Preface
17
Increased computer interconnectivity and the popularity of the
18
Internet are offering organizations of all types unprecedented
19
opportunities to improve operations by reducing paper processing,
20
cutting costs, and sharing information. However, the success of
21
many of these efforts depends, in part, on an organization's
22
ability to protect the integrity, confidentiality, and availability
23
of the data and systems it relies on.
24
Deficiencies in federal information security are a growing
25
concern. In a February 1997 series of reports to the Congress, GAO
26
designated information security as a governmentwide high-risk area.
27
In October 1997, the President's Commission on Critical
28
Infrastructure Protection described the potentially devastating
29
implications of poor information security from a broader
30
perspective in its report entitled Critical Foundations: Protecting
31
America's Infrastructures. Since then, audit reports have continued
32
to identify widespread information security weaknesses that place
33
critical federal operations and assets at risk.
34
Although many factors contribute to these weaknesses, audits by
35
GAO and Inspectors General have found that an underlying cause is
36
poor security program management. To help identify solutions to
37
this problem, Senators Fred Thompson and John Glenn, Chairman and
38
Ranking Minority Member, respectively, of the Senate Committee on
39
Governmental Affairs, requested that we study organizations with
40
superior security programs to identify management practices that
41
could benefit federal agencies. This guide outlines the results of
42
that study. It is intended to assist federal officials in
43
strengthening their security programs, and we are pleased that it
44
has been endorsed by the federal Chief Information Officers
45
Council.
46
This guide is one of a series of GAO publications, listed in
47
appendix I, that are intended to define actions federal officials
48
can take to better manage their information resources. It was
49
prepared under the direction of Jack L. Brock, Director,
50
Governmentwide and Defense Information Systems, who can be reached
51
at 202-512-6240 or [email protected].
52
53
Gene L. Dodaro Assistant Comptroller General Accounting and
54
Information Management Division
55
GAO/AIMD-98-68 Information Security Management Page 1
56
57
A Message From the Federal Chief Information Officers
58
Council
59
Washington April 7, 1998
60
A high priority of the CIO Council is to ensure the
61
implementation of security practices within the Federal government
62
that gain public confidence and protect government services,
63
privacy, and sensitive and national security information. This
64
Executive Guide, "Information Security Management, Learning From
65
Leading Organizations," clearly illustrates how leading
66
organizations are successfully addressing the challenges of
67
fulfilling that goal. These organizations establish a central
68
management focal point, promote awareness, link policies to
69
business risks, and develop practical risk assessment procedures
70
that link security to business needs. This latter point--the need
71
to link security to business requirements--is particularly
72
important, and is illustrated in a statement of a security manager
73
quoted in the guide: "Because every control has some cost
74
associated with it, every control needs a business reason to be put
75
in place."
76
The CIO Council is pleased to endorse the principles and best
77
practices embodied in this guide. Its findings underscore the
78
policies articulated in Appendix III to OMB Circular A-130,
79
"Security of Federal Automated Information Resources." We expect
80
that it will be a valuable resource for all agency CIOs and program
81
managers who execute those policies, and will complement the other
82
activities of the Council to improve Federal information systems
83
security.
84
We look forward to working with the General Accounting Office in
85
the future as we implement these best practices to further enhance
86
agency security practices and programs.
87
88
Contents
89
Federal Information Security Is A Growing Concern
90
91
92
93
94
Federal Information Security Is A Growing Concern
95
Electronic information and automated systems are essential to
96
virtually all major federal operations. If agencies cannot protect
97
the availability, integrity, and, in some cases, the
98
confidentiality, of this information, their ability to carry out
99
their missions will be severely impaired. However, despite the
100
enormous dependence on electronic information and systems, audits
101
continue to disclose serious information security weaknesses. As a
102
result, billions of dollars in federal assets are at risk of loss,
103
vast amounts of sensitive data are at risk of inappropriate
104
disclosure, and critical computer-based operations are vulnerable
105
to serious disruptions.
106
This guide is designed to promote senior executives' awareness
107
of information security issues and to provide information they can
108
use to establish a management framework for more effective
109
information security programs. Most senior federal executives, like
110
many of their private sector counterparts, are just beginning to
111
recognize the significance of these risks and to fully appreciate
112
the importance of protecting their information resources. The
113
opening segments describe the problem of weak information security
114
at federal agencies, identify existing federal guidance, and
115
describe the issue of information security management in the
116
context of other information technology management issues. The
117
remainder of the guide describes 16 practices, organized under five
118
management principles, that GAO identified during a study of
119
nonfederal organizations with reputations for having good
120
information security programs. Each of these practices contains
121
specific examples of the techniques used by these organizations to
122
increase their security program's effectiveness.
123
124
Potential Risks Are Significant
125
Although they have relied on computers for years, federal
126
agencies, like businesses and other organizations throughout the
127
world, are experiencing an explosion in the use of electronic data
128
and networked computer systems. As a result, agencies have become
129
enormously dependent on these systems and data to support their
130
operations.
131
The Department of Defense, alone, has a vast information
132
infrastructure that includes 2.1 million computers and over 10,000
133
networks that are used to
134
Page 6 GAO/AIMD-98-68 Information Security Management
135
exchange electronic messages, obtain data from remote computer
136
sites, and maintain critical records. Civilian agencies also are
137
increasingly reliant on automated, often interconnected, systems,
138
including the Internet, to support their operations. For
139
example,
140
law enforcement officials throughout the United States and
141
Canada rely on
142
the Federal Bureau of Investigation's National Crime Information
143
Center
144
computerized database for access to sensitive criminal justice
145
records on
146
individual offenders;
147
the Internal Revenue Service relies on computers to process and
148
store
149
hundreds of millions of confidential taxpayer records;
150
the Customs Service relies on automated systems to support its
151
processing
152
and inspection of hundreds of billions of dollars worth of
153
imported goods;
154
and
155
many federal agencies, such as the Social Security
156
Administration, the
157
Department of Agriculture, and the Department of Health and
158
Human
159
Services, rely on automated systems to manage and distribute
160
hundreds of
161
billions of dollars worth of payments to individuals and
162
businesses, such as
163
medicare, social security, and food stamp benefits.
164
Although these advances promise to streamline federal operations
165
and improve the delivery of federal services, they also expose
166
these activities to greater risks. This is because automated
167
systems and records are fast replacing manual procedures and paper
168
documents, which in many cases are no longer available as "backup"
169
if automated systems should fail.
170
This risk is exacerbated because, when systems are
171
interconnected to form networks or are accessible through public
172
telecommunication systems, they are much more vulnerable to
173
anonymous intrusions from remote locations. Also, much of the
174
information maintained by federal agencies, although unclassified,
175
is extremely sensitive, and many automated operations are
176
attractive targets for individuals or organizations with malicious
177
intentions, such as committing fraud for personal gain or
178
sabotaging federal operations. Several agencies have experienced
179
intrusions into their systems, and there are indications, such as
180
tests at the Department of Defense, that the number of attacks is
181
growing and that many attacks are not detected.
182
Additional risks stem from agency efforts to examine and adjust
183
their computer systems to ensure that they properly recognize the
184
Year 2000. These Year 2000 conversion efforts are often conducted
185
under severe time constraints that, without adequate management
186
attention, could result in a weakening of controls over the
187
integrity of data and programs and over the confidentiality of
188
sensitive data.
189
GAO/AIMD-98-68 Information Security Management Page 7
190
191
192
Information Security Risks
193
194
195
196
Weaknesses Abound, but Management Attention Has Been
197
Lacking
198
"Just as in the private sector, many federal agencies are
199
reluctant to make the investments required in this area [of
200
computer security] because of limited budgets, lack of direction
201
and prioritization from senior officials, and general ignorance of
202
the threat."
203
-- Statement of Gary R. Bachula, Acting Under Secretary for
204
Technology, Department of Commerce, before House Science
205
Subcommittee on Technology, June 19, 1997
206
Unfortunately, federal agencies are not adequately protecting
207
their systems and data. In September 1996, we reported that audit
208
reports and agency selfassessments issued during the previous 2
209
years showed that weak information security was a widespread
210
problem.1 Specifically, weaknesses such as poor controls over
211
access to data and inadequate disaster recovery plans increased the
212
risk of losses, inappropriate disclosures, and disruptions in
213
service associated with the enormous amounts of electronically
214
maintained information essential for delivering federal services
215
and assessing the success of federal programs. Due to these
216
previously reported weaknesses and findings resulting from our
217
ongoing work, in February 1997, we designated information security
218
as a new governmentwide high-risk issue.2
219
In our September 1996 report, we stated that an underlying cause
220
of federal information security weaknesses was that agencies had
221
not implemented information security programs that (1) established
222
appropriate policies and controls and (2) routinely monitored their
223
effectiveness. Despite repeated reports of serious problems, senior
224
agency officials had not provided the management attention needed
225
to ensure that their information security programs were
226
effective.
227
Also, in that report, we made a number of recommendations
228
intended to improve the Office of Management and Budget's (OMB)
229
oversight of agency information security practices and strengthen
230
its leadership role in this area. Specifically, we recommended that
231
OMB promote the federal Chief Information Officers Council's
232
adoption of information security as one of its top priorities and
233
encourage the council to develop a strategic plan for increasing
234
awareness of the importance of information security, especially
235
among senior agency executives, and improving information security
236
program management
237
1
238
Information Security: Opportunities for Improved OMB Oversight
239
of Agency Practices (GAO/AIMD-96-110, September 24, 1996).
240
2
241
High-Risk Series: Information Management and Technology
242
(GAO/HR-97-9, February 1997).
243
GAO/AIMD-98-68 Information Security Management Page 9
244
governmentwide. Initiatives that we suggested for the CIO
245
Council to consider
246
incorporating in its strategic plan included
247
developing information on the existing security risks associated
248
with
249
nonclassified systems currently in use,
250
developing information on the risks associated with evolving
251
practices,
252
such as Internet use,
253
identifying best practices regarding information security
254
programs so
255
that they can be adopted by federal agencies,
256
establishing a program for reviewing the adequacy of individual
257
agency
258
information security programs using interagency teams of
259
reviewers,
260
ensuring adequate review coverage of agency information
261
security
262
practices by considering the scope of various types of audits
263
and
264
reviews performed and acting to address any identified gaps
265
in
266
coverage,
267
developing or identifying training and certification programs
268
that could
269
be shared among agencies, and
270
identifying proven security tools and techniques.
271
Since September 1996, the CIO Council, under OMB's leadership,
272
has taken some significant actions, which include designating
273
information security as one of six priority areas and establishing
274
a Security Committee. The Security Committee, in turn, has
275
developed a preliminary plan for addressing various aspects of the
276
problem, established links with other federal entities involved in
277
security issues, held a security awareness day for federal
278
officials, and begun exploring ways to improve federal incident
279
response capabilities.
280
Although there is more that OMB and the CIO Council can do,
281
information security is primarily the responsibility of individual
282
agencies. This is because agency managers are in the best position
283
to assess the risks associated with their programs and to develop
284
and implement appropriate policies and controls to mitigate these
285
risks. Accordingly, in our reports over the last several years, we
286
have made dozens of specific recommendations to individual
287
agencies. Although many of these recommendations have been
288
implemented, similar weaknesses continue to surface because
289
agencies have not implemented a management framework for overseeing
290
information security on an agencywide and ongoing basis. A list of
291
our previous reports and testimonies on information security is
292
provided at the end of this guide.
293
294
295
Requirements Are Outlined in Laws and Guidance
296
The need for federal agencies to protect sensitive and critical,
297
but unclassified, federal data has been recognized for years in
298
various laws, including the Privacy Act of 1974, the Paperwork
299
Reduction Act of 1995, and the Computer
300
Page 10 GAO/AIMD-98-68 Information Security Management
301
Security Act of 1987. Further, since enactment of the original
302
Paperwork Reduction Act in 1980, OMB has been responsible for
303
developing information security guidance and overseeing agency
304
practices, and the Computer Security Act assigns the National
305
Institute of Standards and Technology (NIST) primary responsibility
306
for developing technical standards and providing related guidance.
307
OMB, NIST, and agency responsibilities regarding information
308
security were recently reemphasized in the Clinger-Cohen Act of
309
1996, formerly named the Information Technology Management Reform
310
Act of 1996. The adequacy of controls over computerized data is
311
also addressed indirectly by the Federal Managers' Financial
312
Integrity Act of 1982 and the Chief Financial Officers Act of 1990.
313
The Federal Managers' Financial Integrity Act requires agency
314
managers to annually evaluate their internal control systems and
315
report to the President and the Congress any material weaknesses
316
that could lead to fraud, waste, and abuse in government
317
operations. The Chief Financial Officers Act requires agencies to
318
develop and maintain financial management systems that provide
319
complete, reliable, consistent, and timely information.
320
In addition, a considerable body of federal guidance on
321
information security has been developed. OMB has provided guidance
322
since 1985 in its Circular A130, Appendix III, Security of Federal
323
Automated Information Resources, which was updated in February
324
1996. Further, NIST has issued numerous Federal Information
325
Processing Standards, as well as a comprehensive description of
326
basic concepts and techniques entitled An Introduction to Computer
327
Security: The NIST Handbook, Special Publication 800-12, December
328
1995, and Generally Accepted Principles and Practices for Securing
329
Information Technology Systems,3 published in September 1996.
330
Additional federal requirements have been established for the
331
protection of information that has been classified for national
332
security purposes. However, these requirements are not discussed
333
here because this guide pertains to the protection of sensitive but
334
unclassified data, which constitute the bulk of data supporting
335
most federal operations.
336
337
338
Exploring Practices of Leading Organizations
339
To supplement our ongoing audit work at federal agencies and
340
gain a broader understanding of how information security programs
341
can be successfully implemented, we studied the management
342
practices of eight nonfederal
343
Appendix II lists the principles identified in NIST's Generally
344
Accepted Principles and Practices for Securing Information
345
Technology Systems, September 1996.
346
GAO/AIMD-98-68 Information Security Management Page 11
347
organizations recognized as having strong information security
348
programs. The specific objective of our review was to determine how
349
such organizations have designed and implemented their programs in
350
order to identify practices that could be applied at federal
351
agencies.
352
We focused primarily on the management framework that these
353
organizations had established rather than on the specific controls
354
that they had chosen, because previous audit work had identified
355
security management as an underlying problem at federal agencies.
356
Although powerful technical controls, such as those involving
357
encryption, are becoming increasingly available to facilitate
358
information security, effective implementation requires that these
359
techniques be thoughtfully selected and that their use be monitored
360
and managed on an ongoing basis. In addition, there are many
361
aspects of information security, such as risk assessment, policy
362
development, and disaster recovery planning, that require
363
coordinated management attention.
364
To identify leading organizations, we reviewed professional
365
literature and research information and solicited suggestions from
366
experts in professional organizations, nationally known public
367
accounting firms, and federal agencies. In selecting organizations
368
to include in our study, we relied primarily on recommendations
369
from the Computer Security Institute and public accounting firms
370
because they were in a position to evaluate and compare information
371
security programs at numerous organizations. In addition, we
372
attempted to select organizations from a variety of business
373
sectors to gain a broad perspective on the information security
374
practices being employed. After initial conversations with a number
375
of organizations, we narrowed our focus to eight organizations that
376
had implemented fairly comprehensive organizationwide information
377
security programs. All were prominent nationally known
378
organizations. They included a financial services corporation, a
379
regional electric utility, a state university, a retailer, a state
380
agency, a nonbank financial institution, a computer vendor, and an
381
equipment manufacturer. The number of computer users at these
382
organizations ranged from 3,500 to 100,000, and four had
383
significant international operations. Because most of the
384
organizations considered discussions of their security programs to
385
be sensitive and they wanted to avoid undue public attention on
386
this aspect of their operations, we agreed not to identify the
387
organizations by name.
388
We obtained information primarily through interviews with senior
389
security managers and document analysis conducted during and after
390
visits to the organizations we studied. In a few cases, we toured
391
the organizations' facilities and observed practices in operation.
392
We supplemented these findings, to a very limited extent, with
393
information obtained from others. For example, at the state agency,
394
we also met with a statewide security program official and with
395
state auditors. In addition, we asked the Computer Security
396
Institute to
397
Page 12 GAO/AIMD-98-68 Information Security Management
398
query its members about their efforts to measure the
399
effectiveness of their security programs in order to gain a broader
400
perspective of practices in this area.
401
To determine the applicability of the leading organization's
402
practices to federal agencies, we discussed our findings with
403
numerous federal officials, including officials in OMB's
404
Information Policy and Technology Branch, the Computer Security
405
Division of NIST's Information Technology Laboratory, CIO Council
406
members, the chairman of the Chief Financial Officers Council's
407
systems subcommittee, information security officers from 15 federal
408
agencies, and members of the President's Commission on Critical
409
Infrastructure Protection. Further, we discussed our findings with
410
our Executive Council on Information Management and Technology, a
411
group of executives with extensive experience in information
412
technology management who advise us on major information management
413
issues affecting federal agencies.
414
Throughout the guide, we make several observations on federal
415
information security practices in order to contrast them with the
416
practices of the nonfederal organizations we studied. These
417
observations are based on the body of work we have developed over
418
the last several years and on our recent discussions with federal
419
information security officers and other federal officials who are
420
knowledgeable about federal information security practices.
421
Although we attempted to be as thorough as possible within the
422
scope of our study, we recognize that more work in this area
423
remains to be done, including a more in-depth study of individual
424
practices. We also recognize that the practices require customized
425
application at individual organizations depending on factors such
426
as existing organizational strengths and weaknesses.
427
428
429
Security as an Element of a Broader Information Management
430
Strategy
431
Although this guide focuses on information security program
432
management, this is only one aspect of an organization's overall
433
information management strategy. As such, an organization's success
434
in managing security-related efforts is likely to hinge on its
435
overall ability to manage its use of information technology.
436
Unfortunately, federal performance in this broader area has been
437
largely inadequate. Over the past 6 years, federal agencies have
438
spent a reported $145 billion on information technology with
439
generally disappointing mission-related results.
440
Recognizing the need for improved information management, the
441
Congress has enacted legislation that is prompting landmark reforms
442
in this area. In particular, the Paperwork Reduction Act of 1995
443
emphasized the need for agencies to acquire and apply information
444
resources to effectively support the accomplishment of agency
445
missions and the delivery of services to the public. The
446
Clinger-Cohen Act of 1996 repeated this theme and provided more
447
detailed requirements. These laws emphasize involving senior
448
executives in information management decisions, appointing
449
senior-level chief information officers, and using performance
450
measures to assess the contribution of technology in achieving
451
mission results. Although their primary focus is much broader, both
452
of these laws specify security as one of the aspects of information
453
management that must be addressed. This environment of reform is
454
conducive to agencies rethinking their security programs, as part
455
of broader information management changes, and considering the
456
implementation of the practices that have been adopted by
457
nonfederal organizations.
458
459
460
Other Issues Affecting Federal Information Security
461
Security program management and the related implementation of
462
controls over access to data, systems, and software programs, as
463
well as service continuity planning, are central factors affecting
464
an organization's ability to protect its information resources and
465
the program operations that these resources support. However, there
466
are numerous policy, technical, legal, and human resource issues
467
that are not fully within the control of officials at individual
468
agencies. These issues are currently being debated and, in many
469
cases, addressed by private-sector and federal efforts. They
470
include, but are not limited to, matters concerning (1) the use of
471
encryption to protect the confidentiality of information and other
472
cryptographic capabilities, including digital signatures and
473
integrity checks, (2) personal privacy, (3) the adequacy of laws
474
protecting intellectual property and permitting investigations into
475
computer-related crimes, and (4) the availability of adequate
476
technical expertise and security software tools.
477
These topics are beyond the scope of this guide and, thus, are
478
not discussed herein. However, it is important to recognize that
479
strengthening information security requires a multifaceted approach
480
and sometimes involves issues that are beyond the control of
481
individual businesses and agencies. Although the management
482
practices described in this guide are fundamental to improving an
483
organization's information security posture, they should be
484
considered in the context of this broader spectrum of issues.
485
486
487
488
Leading Organizations Apply Fundamental Risk Management
489
Principles
490
The organizations we studied were striving to manage the same
491
types of risks that face federal agencies. To do so, they had
492
responded to these risks by reorienting their security programs
493
from relatively low-profile operations focused primarily on
494
mainframe security to visible, integral components of their
495
organizations' business operations. Because of the similarities in
496
the challenges they face, we believe that federal entities can
497
learn from these organizations to develop their own more effective
498
security programs.
499
500
Federal and Nonfederal Entities Face Similar Risks and Rely on
501
Similar Technologies
502
Like federal agencies, the organizations we studied must protect
503
the integrity, confidentiality, and availability of the information
504
resources they rely on. Although most of the organizations were
505
private enterprises motivated by the desire to earn profits, their
506
information security concerns focused on providing high-quality
507
reliable service to their customers and business partners, avoiding
508
fraud and disclosures of sensitive information, promoting efficient
509
operations, and complying with applicable laws and regulations.
510
These are the same types of concerns facing federal agencies.
511
Also, like federal agencies, the organizations relied, to
512
varying degrees, on a mix of mainframe and client-server systems
513
and made heavy use of interconnected networks. In addition, all
514
were either using or exploring the possibilities of using the
515
Internet to support their business operations.
516
517
518
Information Security Objectives Common to Federal and
519
Nonfederal Entities
520
521
Protect the confidentiality of sensitive
522
Avoid fraud personal and financial data on employees, clients,
523
customers, and
524
Avoid expensive and beneficiaries disruptive incidents
525
Protect sensitive operational data from
526
Comply with pertinent laws inappropriate disclosure and
527
regulations
528
Avoid third-party liability for illegal or
529
malicious acts committed with the organization's computer or
530
network resources Avoid a hostile workplace atmosphere that may
531
impair employee performance
532
533
534
Risk Management Principles Provide A Framework for an Effective
535
Information Security Program
536
Although the nature of their operations differed, the
537
organizations all had embraced five risk management principles,
538
which are listed in the box below. These principles guided the
539
organizations' efforts to manage the risk associated with the
540
increasingly automated and interconnected environment in which they
541
functioned.
542
543
544
Risk Management Principles Implemented by Leading
545
Organizations
546
Assess risk and determine needs Establish a central management
547
focal point Implement appropriate policies and related controls
548
Promote awareness Monitor and evaluate policy and control
549
effectiveness
550
An important factor in effectively implementing these principles
551
was linking them in a cycle of activity that helped ensure that
552
information security policies addressed current risks on an ongoing
553
basis. The single most important factor in prompting the
554
establishment of an effective security program was a general
555
recognition and understanding among the organization's most senior
556
executives of the enormous risks to business operations associated
557
with relying on automated and highly interconnected systems.
558
However, risk assessments of individual business applications
559
provided the basis for establishing policies and selecting related
560
controls. Steps were then taken to increase the awareness of users
561
concerning these risks and related policies. The effectiveness of
562
controls and awareness activities was then monitored through
563
various analyses, evaluations, and audits, and the results provided
564
input to subsequent risk assessments, which determined if existing
565
policies and controls needed to be modified. All of these
566
activities were coordinated through a central security management
567
office or group the staff of which served as consultants and
568
GAO/AIMD-98-68 Information Security Management Page 17
569
facilitators to individual business units and senior management.
570
This risk management cycle is illustrated in the diagram below.
571
572
573
Risk Management Cycle
574
Assess Risk & Determine Needs
575
576
Implement Central
577
578
Monitor &
579
Policies &
580
Focal
581
Evaluate
582
Controls
583
Point
584
Promote Awareness
585
This continuing cycle of monitoring business risks, maintaining
586
policies and controls, and monitoring operations parallels the
587
process associated with managing the controls associated with any
588
type of program. In addition, these principles should be familiar
589
to federal agency officials since they have been emphasized in much
590
of the recent guidance pertaining to federal information security.
591
Most notably, they incorporate many of the concepts included in
592
NIST's September 1996 publication, Generally Accepted Principles
593
and Practices for Securing Information Technology Systems, and in
594
OMB's February 1996 revision of Circular A-130, Appendix III,
595
Security of Federal Automated Information Resources.
596
597
598
Principles Were Implemented Though Similar Practices
599
The organizations had developed similar sets of practices to
600
implement the five risk management principles, although the
601
techniques they employed varied depending on each organization's
602
size and culture. Some programs were less mature than others and
603
had not fully implemented all of the practices. However, security
604
managers at each organization agreed that the 16 practices outlined
605
in the following illustration, which relate to the five risk
606
management principles, were key to the effectiveness of their
607
programs.
608
Sixteen Practices Employed by Leading Organizations To Implement
609
the Risk Management Cycle
610
611
Practices
612
Principles
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
The following pages provide a more detailed discussion of these
631
practices and illustrative examples of the techniques used to
632
implement them by the organizations we studied. The discussion
633
follows the order of the practices as outlined above. Individual
634
agency priorities for adopting the practices will vary depending on
635
their existing security programs.
636
Page 20 GAO/AIMD-98-68 Information Security Management
637
Assess Risk & Determine Needs
638
639
640
641
642
643
Assess Risk and
644
645
Implement Central
646
647
Monitor &
648
649
650
Policies &
651
Focal
652
653
654
655
Determine Needs
656
Evaluate
657
658
Controls
659
Point
660
Promote Awareness
661
"We are not in the business of protecting information. We only
662
protect information insofar as it supports the business needs and
663
requirements of our company."
664
-- Senior security manager at a major electric utility
665
All of the organizations said that risk considerations and
666
related cost-benefit trade-offs were a primary focus of their
667
security programs. Security was not viewed as an end in itself, but
668
as a set of policies and related controls designed to support
669
business operations, much like other types of internal
670
controls.4
671
Controls were identified and implemented to address specific
672
business risks. As one organization's security manager said,
673
"Because every control has some cost associated with it, every
674
control needs a business reason to be put in place." Regardless of
675
whether they were analyzing existing or proposed operations,
676
security managers told us that identifying and assessing
677
information security risks in terms of the impact on business
678
operations was an essential step in determining what controls were
679
needed and what level of resources could be expended on controls.
680
In this regard, understanding the business risks associated with
681
information security was the starting point of the risk management
682
cycle.
683
In GAO's recently revised Standards for Internal Control in the
684
Federal Government, Exposure Draft (GAO/AIMD-98-21.3.1, December
685
1997), controls over computerized information and information
686
processing are discussed in the context of the larger body of an
687
agency's internal control activities.
688
GAO/AIMD-98-68 Information Security Management Page 21
689
690
691
Practice 1: Recognize Information Resources as Essential
692
Organizational Assets That Must Be Protected
693
"Information technology is an integral and critical ingredient
694
for the successful functioning of major U.S. companies."
695
-- Deloitte & Touche LLP Survey of American Business
696
Leaders, November 1996
697
The organizations we studied recognized that information and
698
information systems were critical assets essential to supporting
699
their operations that must be protected. As a result, they viewed
700
information protection as an integral part of their business
701
operations and of their strategic planning.
702
703
Senior Executive Support Is Crucial
704
In particular, senior executive recognition of information
705
security risks and interest in taking steps to understand and
706
manage these risks were the most important factors in prompting
707
development of more formal information security programs. Such
708
high-level interest helped ensure that information security was
709
taken seriously at lower organizational levels and that security
710
specialists had the resources needed to implement an effective
711
program.
712
This contrasts with the view expressed to us by numerous federal
713
managers and security experts that many top federal officials have
714
not recognized the indispensable nature of electronic data and
715
automated systems to their program operations. As a result,
716
security-related activities intended to protect these resources do
717
not receive the resources and attention that they merit.
718
In some cases, senior management's interest had been generated
719
by an incident that starkly illustrated the organization's
720
information security vulnerabilities, even though no damage may
721
have actually occurred. In other cases, incidents at other
722
organizations had served as a "wake-up call." Two organizations
723
noted that significant interest on the part of the board of
724
directors was an important factor in their organizations' attention
725
to information security. However, security managers at many of the
726
organizations told us that their chief executive officers or other
727
very senior executives had an ongoing interest in information
728
technology and security, which translated into an organizationwide
729
emphasis on these areas.
730
Although the emphasis on security generally emanated from top
731
officials, security specialists at lower levels nurtured this
732
emphasis by keeping them
733
Page 22 GAO/AIMD-98-68 Information Security Management
734
abreast of emerging security issues, educating managers at all
735
levels, and by emphasizing the related business risks to their own
736
organizations.
737
738
739
Security Seen As An Enabler
740
In addition, most of the organizations were aggressively
741
exploring ways to improve operational efficiency and service to
742
customers through new or expanded applications of information
743
technology, which usually prompted new security considerations.
744
Officials at one organization viewed their ability to exploit
745
information technology as giving them a significant competitive
746
advantage. In this regard, several organizations told us that
747
security was increasingly being viewed as an enabler--a necessary
748
step in mitigating the risks associated with new applications
749
involving Internet use and broadened access to the organization's
750
computerized data. As a result, security was seen as an important
751
component in improving business operations by creating
752
opportunities to use information technology in ways that would not
753
otherwise be feasible.
754
Practice 2: Develop Practical Risk Assessment Procedures That
755
Link Security to Business Needs
756
The organizations we studied had tried or were exploring various
757
risk assessment methodologies, ranging from very informal
758
discussions of risk to fairly complex methods involving the use of
759
specialized software tools. However, the organizations that were
760
the most satisfied with their risk assessment procedures were those
761
that had defined a relatively simple process that could be adapted
762
to various organizational units and involved a mix of individuals
763
with knowledge of business operations and technical aspects of the
764
organization's systems and security controls.
765
The manufacturing company had developed an automated checklist
766
that asked business managers and relevant staff in individual units
767
a series of questions that prompted them to consider the impact of
768
security controls, or a lack thereof, on their unit's operations.
769
The results of the analysis were reported in a letter to senior
770
management that stated the business unit's compliance with the
771
security policy, planned actions to become compliant, or
772
willingness to accept the risk. The results were also reported to
773
the internal auditors, who used them as a basis for reviewing the
774
business unit's success in implementing the controls that the
775
unit's managers had determined were needed. Through the reporting
776
procedure, the business managers took responsibility for either
777
tolerating or mitigating security risks associated with their
778
operations.
779
Such procedures provided a relatively quick and consistent means
780
of exploring risk with business managers, selecting cost-effective
781
controls, and documenting conclusions and business managers'
782
acceptance of final determinations regarding what controls were
783
needed and what risks could be tolerated. With similar objectives
784
in mind, the utility company had developed a streamlined risk
785
assessment process that brought together business managers and
786
technical experts to discuss risk factors and mitigating controls.
787
(This process is described in detail as a case example on page
788
28.)
789
Other organizations had developed less formal and comprehensive
790
techniques for ensuring that risks were considered prior to changes
791
in operations.
792
The retailer had established standard procedures for requesting
793
and granting new network connections. Under these procedures,
794
documentation about the business need for the proposed connection
795
and the risks associated with the proposed connection had to be
796
submitted in writing prior to consideration by the central security
797
group. Then, a meeting between the technical group, which
798
implemented new connections, the requester, and the central
799
security group was held to further explore the issue. The
800
documentation and meeting helped
801
Page 24 GAO/AIMD-98-68 Information Security Management
802
ensure that the requester's business needs were clearly
803
understood and the best solution was adopted without compromising
804
the network's security.
805
The financial services corporation had implemented procedures
806
for documenting business managers' decisions to deviate from
807
organizationwide policies and standards. In order to deviate from a
808
"mandatory policy," the business unit prepared a letter explaining
809
the reason for the deviation and recognizing the related risk. Both
810
the business unit executive and the central security group manager
811
signed the letter to acknowledge their agreement to the necessity
812
of the policy deviation. Deviations from less rigid "standards"
813
were handled similarly, although the letter could be signed by the
814
business unit executive, alone, and did not require the central
815
security group's approval, though it was generally received. In all
816
cases, the central security group discussed the information
817
security implications of the deviation with the appropriate
818
executive and signed-off only when it was satisfied that the
819
executives fully understood the risk associated with the deviation.
820
However, the ultimate decision on whether a deviation from policies
821
or standards was appropriate was usually left to the business
822
unit.
823
824
825
Organizations Saw Benefits Despite Lack of Precision
826
"Actual losses are not necessarily good indications of risk."
827
--Security manager at a prominent financial institution
828
Although all of the organizations placed emphasis on
829
understanding risks, none attempted to precisely quantify them,
830
noting that few quantified data are available on the likelihood of
831
an incident occurring or on the amount of damage that is likely to
832
result from a particular type of incident. Such data are not
833
available because many losses are never discovered and others are
834
never reported, even within the organizations where they occurred.
835
In addition, there are limited data on the full costs of damage
836
caused by security weaknesses and on the operational costs of
837
specific control techniques. Further, due to fastpaced changes in
838
technology and factors such as the tools available to wouldbe
839
intruders, the value of applying data collected in past years to
840
the current environment is questionable. As a result, it is
841
difficult, if not impossible, to precisely compare the cost of
842
controls with the risk of loss in order to determine which controls
843
are the most cost-effective. Ultimately, business managers and
844
security specialists must rely on the best information available
845
and their best judgment in determining what controls are
846
needed.
847
Despite their inability to precisely compare the costs of
848
controls with reductions in risk, the organizations said that risk
849
assessments still served their primary purpose of ensuring that the
850
risk implications of new and existing applications were explored.
851
In particular, the security managers believed that adequate
852
information was available to identify the most significant risks.
853
For example, in addition to their own organization's experience,
854
they noted that information on threats, specific software
855
vulnerabilities, and potential damage was widely available in
856
technical literature, security bulletins from organizations such as
857
the Carnegie-Mellon Computer Emergency Response Team (CERT),
858
surveys done by professional associations and audit firms, and
859
discussion groups. Although much of this information was anecdotal,
860
the security managers thought that it was sufficient to give them a
861
good understanding of the threats of concern to their organizations
862
and of the potential for damage.
863
In addition, the lack of quantified results did not diminish the
864
value of risk assessments as a tool for educating business
865
managers. By increasing the understanding of risks, risk
866
assessments (1) improved business managers' ability to make
867
decisions on controls needed, in the absence of quantified risk
868
assessment results, and (2) engendered support for policies and
869
controls adopted, thus helping to ensure that policies and controls
870
would operate as intended.
871
Practice 3: Hold Program and Business Managers Accountable
872
"Holding business managers accountable and changing the security
873
staff's role from enforcement to service has been a major paradigm
874
shift for the entire company."
875
-- Security manager at a major equipment manufacturer
876
The organizations we studied were unanimous in their conviction
877
that business managers must bear the primary responsibility for
878
determining the level of protection needed for information
879
resources that support business operations. In this regard, most
880
held the view that business managers should be held accountable for
881
managing the information security risks associated with their
882
operations, much as they would for any other type of business risk.
883
However, security specialists played a strong educational and
884
advisory role and had the ability to elevate discussions to higher
885
management levels when they believed that risks were not being
886
adequately addressed.
887
Business managers, usually referred to as program managers in
888
federal agencies, are generally in the best position to determine
889
which of their information resources are the most sensitive and
890
what the business impact of a loss of integrity, confidentiality,
891
or availability would be. Business or program managers are also in
892
the best position to determine how security controls may impair
893
their operations. For this reason, involving them in selecting
894
controls can help ensure that controls are practical and will be
895
implemented.
896
Accordingly, security specialists had assumed the role of
897
educators, advisors, and facilitators who helped ensure that
898
business managers were aware of risks and of control techniques
899
that had been or could be implemented to mitigate the risks. For
900
several of the organizations, these roles represented a dramatic
901
reversal from past years, when security personnel were viewed as
902
rigid, sometimes overly protective enforcers who often did not
903
adequately consider the effect of security controls on business
904
operations.
905
Some of the organizations had instituted mechanisms for
906
documenting and reporting business managers' risk determinations.
907
These generally required some type of sign-off on memoranda that
908
either (1) reported deviations from predetermined control
909
requirements, as was the case at the financial services corporation
910
and the manufacturing company discussed previously or (2) provided
911
the results of risk assessments, as was the case of the utility
912
company described in the following case example. According to the
913
security managers, such sign-off requirements helped ensure that
914
business managers carefully considered their decisions before
915
finalizing them.
916
GAO/AIMD-98-68 Information Security Management Page 27
917
918
Case Example: A Practical Method for Involving Business
919
Managers in Risk Assessment
920
A major electric utility company has developed an efficient and
921
disciplined process for ensuring that information security-related
922
risks to business operations are considered and documented. The
923
process involves analyzing one system or segment of business
924
operation at a time and convening a team of individuals that
925
includes business managers who are familiar with business
926
information needs and technical staff who have a detailed
927
understanding of potential system vulnerabilities and related
928
controls. The sessions, which follow a standard agenda, are
929
facilitated by a member of the central security group who helps
930
ensure that business managers and technical staff communicate
931
effectively and adhere to the agenda.
932
During the session, the group brainstorms to identify potential
933
threats, vulnerabilities, and resultant negative impacts on data
934
integrity, confidentiality, and availability. Then, they analyze
935
the effects of such impacts on business operations and broadly
936
categorize the risks as major or minor. The group does not usually
937
attempt to obtain or develop specific numbers for threat likelihood
938
or annual loss estimates unless the data for determining such
939
factors are readily available. Instead, they rely on their general
940
knowledge of threats and vulnerabilities obtained from national
941
incident response centers, professional associations and
942
literature, and their own experience. They believe that additional
943
efforts to develop precisely quantified risks are not
944
cost-effective because (1) such estimates take an inordinate amount
945
of time and effort to identify and verify or develop, (2) the risk
946
documentation becomes too voluminous to be of practical use, and
947
(3) specific loss estimates are generally not needed to determine
948
if a control is needed.
949
After identifying and categorizing risks, the group identifies
950
controls that could be implemented to reduce the risk, focusing on
951
the most cost-effective controls. As a starting point, they use a
952
list of about 25 common controls designed to address various types
953
of risk. Ultimately, the decision as to what controls are needed
954
lies with the business managers, who take into account the nature
955
of the information assets and their importance to business
956
operations and the cost of controls.
957
The team's conclusions as to what risks exist and what controls
958
are needed are documented along with a related action plan for
959
control implementation. This document is then signed by the senior
960
business manager and technical expert participating and copies are
961
made available to all participant groups and to the internal
962
auditors, who may later audit the effectiveness of the agreed upon
963
controls.
964
Each risk analysis session takes approximately 4 hours and
965
includes 7 to 15 people, though sessions with as many as 50 and as
966
few as 4 people have occurred. Additional time is usually needed to
967
develop the action plan. The information security group conducts
968
between 8 and 12 sessions a month. According to the utility's
969
central information security group, this process increases security
970
awareness among business managers, develops support for needed
971
controls, and helps integrate information security considerations
972
into the organization's business operations.
973
Practice 4: Manage Risk on a Continuing Basis
974
"Information security is definitely a journey, not a
975
destination--there are always new challenges to meet."
976
-- Chief information security officer at a major financial
977
services corporation
978
The organizations emphasized the importance of continuous
979
attention to security to ensure that controls were appropriate and
980
effective. They stressed that constant vigilance was needed to
981
ensure that controls remained appropriate--addressing current risks
982
and not unnecessarily hindering operations--and that individuals
983
who used and maintained information systems complied with
984
organizational policies.
985
Such attention is important for all types of internal controls,
986
but it is especially important for security over computerized
987
information, because, as mentioned previously, the factors that
988
affect computer security are constantly changing in today's dynamic
989
environment. Such changing factors include threats, systems
990
technologies and configurations, known vulnerabilities in existing
991
software, the level of reliance on automated systems and electronic
992
data, and the sensitivity of such operations and data.
993
994
995
996
997
Existing Federal Guidance Provides a Framework for Implementing
998
Risk Management Practices
999
OMB's 1996 revision of Circular A-130, Appendix III, recognizes
1000
that federal agencies have had difficulty in performing effective
1001
risk assessments--expending resources on complex assessments of
1002
specific risks with limited tangible benefits in terms of improved
1003
security. For this reason, the revised circular eliminates a
1004
long-standing federal requirement for formal risk assessments.
1005
Instead, it promotes a risk-based approach and suggests that,
1006
rather than trying to precisely measure risk, agencies focus on
1007
generally assessing and managing risks. This approach is similar to
1008
that used by the organizations we studied.
1009
Similarly, the concept of holding program managers accountable
1010
underlies the existing federal process for accrediting systems for
1011
use. Accreditation is detailed in NIST's Federal Information
1012
Processing Standards Publication 102, Guideline for Computer
1013
Security Certification and Accreditation, which was published in
1014
1983. According to NIST, accreditation is "the formal authorization
1015
by the management official for system operation and an explicit
1016
acceptance of risk." OMB's 1996 update to Circular A-130, Appendix
1017
III, provides similar guidance, specifying that a management
1018
official should authorize in writing the use of each system before
1019
beginning or significantly changing use of the system. "By
1020
authorizing processing in a system, a manager accepts the risks
1021
associated with it."
1022
GAO/AIMD-98-68 Information Security Management Page 29
1023
1024
1025
"A central focal point is essential to spotting trends,
1026
identifying problem areas, and seeing that policies and
1027
administrative actions are handled in a consistent manner."
1028
-- Senior information security officer for a major
1029
university
1030
"Information security has become too important to handle on an
1031
ad hoc basis."
1032
-- Security specialist at a major retailing company
1033
Managing the increased risks associated with a highly
1034
interconnected computing environment demands increased central
1035
coordination to ensure that weaknesses in one organizational unit's
1036
systems do not place the entire organization's information assets
1037
at undue risk. Each of the organizations we studied had adopted
1038
this view and, within the last few years, primarily since 1993, had
1039
established a central security management group or reoriented an
1040
existing central security group to facilitate and oversee the
1041
organization's information security activities. As such, the
1042
central group served as the focal point for coordinating activities
1043
associated with the four segments of the risk management cycle.
1044
As discussed in the previous section on risk analysis, the
1045
central security groups served primarily as advisers or consultants
1046
to the business units, and, thus, they generally did not have the
1047
ability to independently dictate information security practices.
1048
However, most possessed considerable "clout" across their
1049
organizations due largely to the support they received from their
1050
organization's senior management. In this regard, their views
1051
were
1052
GAO/AIMD-98-68 Information Security Management Page 31
1053
sought and respected by the organizations' business managers.
1054
The following case example describes how one organization
1055
strengthened its central security group and reoriented its
1056
focus.
1057
Case Example: Transforming an Organization's Central Security
1058
Focal Point
1059
In 1995, realizing that security was an essential element of its
1060
efforts to innovatively use information technology, a major
1061
manufacturer significantly reorganized and strengthened its central
1062
information security function. Prior to the reorganization, a
1063
central security group of about four individuals concentrated on
1064
mainframe security administration and had little interaction with
1065
the rest of the company. Since then, the central group has grown to
1066
include 12 individuals who manage the security of the company's (1)
1067
main network, (2) decentralized computer operations, and
1068
(3) Internet use. In addition, the group participates in the
1069
company's strategic planning efforts and in the early stages of
1070
software development projects to ensure that security implications
1071
of these efforts are addressed. In this regard, it serves as a
1072
communications conduit between management and the information
1073
systems staff who design, build, and implement new
1074
applications.
1075
Members of the central group possess a variety of technical
1076
skills and have specific information security responsibilities,
1077
such as developing policy, maintaining the firewall that protects
1078
the organization's network from unauthorized intrusions, or
1079
supporting security staff assigned to individual business units.
1080
According to the group's manager, because of the shift in the
1081
central group's responsibilities, "the members of the group had to
1082
change their mind-set from a staff organization to a service
1083
organization. They had to be willing to work with business managers
1084
to enable rather than to control business operations."
1085
Practice 5: Designate a Central Group to Carry Out Key
1086
Activities
1087
Overall, the central security groups served as (1) catalysts for
1088
ensuring that information security risks were considered in both
1089
planned and ongoing operations, (2) central resources for advice
1090
and expertise to units throughout their organizations, and (3) a
1091
conduit for keeping top management informed about security-related
1092
issues and activities affecting the organization. In addition,
1093
these central groups were able to achieve some efficiencies and
1094
increase consistency in the implementation of the organization's
1095
security program by performing tasks centrally that might otherwise
1096
be performed by multiple individual business units.
1097
Specific activities performed by central groups differed
1098
somewhat, primarily because they relied to a varying extent on
1099
security managers and administrators in subordinate units and on
1100
other organizationally separate groups, such as disaster recovery
1101
or emergency response teams. Examples of the most common activities
1102
carried out by central groups are described below.
1103
Developing and adjusting organizationwide policies and guidance,
1104
thus reducing redundant policy-related activities across the
1105
organization's units. For example, the manufacturer's central
1106
security group recently revamped the company's entire information
1107
security manual and dedicated one staff member to maintaining
1108
it.
1109
Educating employees and other users about current information
1110
security risks and helping to ensure consistent understanding and
1111
administration of policies through help-line telephone numbers,
1112
presentations to business units, and written information
1113
communicated electronically or through paper memos.
1114
Initiating discussions on information security risks with
1115
business managers and conducting defined risk assessment
1116
procedures.
1117
Meeting periodically with senior managers to discuss the
1118
security implications of new information technology uses being
1119
considered.
1120
Researching potential threats, vulnerabilities, and control
1121
techniques and communicating this information to others in the
1122
organization. Many of the organizations supplemented knowledge
1123
gained from their own experiences by frequently perusing
1124
professional publications, alerts, and other information available
1125
in print and through the Internet. Several mentioned the importance
1126
of networking with outside organizations, such as the International
1127
Information Integrity Institute, the European Security Forum, and
1128
the Forum of Incident Response and Security
1129
GAO/AIMD-98-68 Information Security Management Page 33
1130
Teams, to broaden their knowledge. One senior security officer
1131
noted, "Sharing information and solutions is important. Many
1132
organizations are becoming more willing to talk with outsiders
1133
about security because they realize that, despite differing
1134
missions and cultures, they all use similar technology and face
1135
many of the same threats."
1136
Monitoring various aspects of the organization's
1137
security-related activities by testing controls, accounting for the
1138
number and types of security incidents, and evaluating compliance
1139
with policies. The central groups often characterized these
1140
evaluative activities as services to the business units.
1141
Establishing a computer incident response capability, and, in
1142
some cases, serving as members of the emergency response team.
1143
Assessing risks and identifying needed policies and controls for
1144
general support systems, such as organizationwide networks or
1145
central data processing centers, that supported multiple business
1146
units. For example, some central groups controlled all new
1147
connections to the organization's main network, ensuring that the
1148
connecting network met minimum security requirements. Similarly,
1149
one organization's central group was instrumental in acquiring a
1150
strong user authentication system to help ensure that network use
1151
could be reliably traced to the individual users. Further, most
1152
central groups oversaw Internet use.
1153
Creating standard data classifications and related definitions
1154
to facilitate protection of data shared among two or more business
1155
units.
1156
Reviewing and testing the security features in both commercially
1157
developed software that was being considered for use and internally
1158
developed software prior to its being moved into production. For
1159
example, the manufacturing company's central group reviewed all new
1160
Internet related applications and had the authority to stop such
1161
applications from going into production if minimum security
1162
standards were not met. Similarly, the central information
1163
protection group at the utility was required to approve all new
1164
applications to indicate that risks had been adequately
1165
considered.
1166
Providing self-assessment tools to business units so that they
1167
could monitor their own security posture. For example, the
1168
financial services corporation provided business units with
1169
software tools and checklists so that they would assume
1170
responsibility for identifying and correcting weaknesses rather
1171
than depending on auditors to identify problems.
1172
Page 34 GAO/AIMD-98-68 Information Security Management
1173
Practice 6: Provide the Central Group Ready and Independent
1174
Access to Senior Executives
1175
Senior information security managers emphasized the importance
1176
of being able to discuss security issues with senior executives.
1177
Several noted that, to be effective, these senior executives had to
1178
be in a position to act and effect change across organizational
1179
divisions. The ability to independently voice security concerns to
1180
senior executives was viewed as important because such concerns
1181
could often be at odds with business managers' and system
1182
developers' desires to implement new computer applications quickly
1183
and avoid controls that would impede efficiency, user friendliness,
1184
and convenience. This ability to elevate significant security
1185
concerns to higher management levels helped ensure that risks were
1186
thoroughly understood and that decisions as to whether such risks
1187
should be tolerated were carefully considered before final
1188
decisions were made.
1189
The organizational positions of the central groups varied. Most
1190
were located two levels below the Chief Information Officer (CIO).
1191
However, the groups reporting directly to the CIO or to an even
1192
more senior official viewed this as an advantage because it
1193
provided them greater independence. Several others said that,
1194
despite their lower organizational position, they felt free to
1195
contact their CIOs and other senior executives when important
1196
security issues arose, and they were relatively unrestrained by the
1197
need to "go through the chain of command." Some noted that senior
1198
managers frequently called them to discuss security issues. For
1199
example, at the nonbank financial institution, the senior security
1200
manager was organizationally placed two levels below the CIO, but
1201
she met independently with the CIO once every quarter. Also, during
1202
the first three months of 1997, she had met twice with the
1203
organization's chief executive officer, at his request, to discuss
1204
the security implications of new applications.
1205
In contrast, several federal information security officials told
1206
us that they felt that their organizations were placed too low in
1207
the organizational structure to be effective and that they had
1208
little or no opportunity to discuss information security issues
1209
with their CIOs and other senior agency officials.
1210
Rather than depend on the personal interest of individual senior
1211
managers, two of the organizations we studied had established
1212
senior-level committees to ensure that information technology
1213
issues, including information security, received appropriate
1214
attention. For example, the university's central group had created
1215
a committee of respected university technical and policy experts to
1216
discuss and build consensus about the importance of certain
1217
information security issues reported to senior management, thus
1218
lending weight and credibility to concerns raised by the central
1219
security office.
1220
GAO/AIMD-98-68 Information Security Management Page 35
1221
Practice 7: Designate Dedicated Funding and Staff
1222
Unlike many federal agencies, the central groups we studied had
1223
defined budgets, which gave them the ability to plan and set goals
1224
for their organization's information security program. At a
1225
minimum, these budgets covered central staff salaries and training
1226
and security hardware and software. At one organization, business
1227
units could supplement the central group's resources in order to
1228
increase the central group's participation in high priority
1229
projects. While all of the central groups had staffs ranging from 3
1230
to 17 people permanently assigned to the group, comparing the size
1231
of these groups is of limited value because of wide variations in
1232
the (1) sizes of the organizations we studied, (2) inherent
1233
riskiness of their operations, and (3) the additional support the
1234
groups received from other organizational components and from
1235
numerous subordinate security managers and administrators.
1236
In particular, no two groups were alike regarding the extent of
1237
support they received from other organizational units. For example,
1238
the computer vendor relied on a security manager in each of the
1239
organization's four regional business units, while the utility's
1240
nine-member central group relied on 48 parttime information
1241
security coordinators at various levels within the company. Some
1242
central groups relied heavily on technical assistance located in
1243
another organizational unit, while others had significant technical
1244
expertise among their own staff, and, thus, were much more involved
1245
in directly implementing and testing controls.
1246
Despite these differences, two key characteristics were common
1247
to each of the organizations: (1) information security
1248
responsibilities had been clearly defined for the groups involved
1249
and (2) dedicated staff resources had been provided to carry out
1250
these responsibilities. The following table summarizes the details
1251
on the size and structure of the organizations' information
1252
security staffs.
1253
1254
1255
Placement and Staffing of Eight Central Information Security
1256
Management Groups Practice 8: Enhance Staff Professionalism and
1257
Technical Skills
1258
1259
The organizations had taken steps to ensure that personnel
1260
involved in various aspects of their information security programs
1261
had the skills and knowledge they needed. In addition, they
1262
recognized that staff expertise had to be frequently updated to
1263
keep abreast of ongoing changes in threats, vulnerabilities,
1264
software, security techniques, and security monitoring tools.
1265
Further, most of the organizations were striving to increase the
1266
professional stature of their staff in order to gain respect from
1267
others in their organizations and attract competent individuals to
1268
security-related positions.
1269
1270
Update Skills and Knowledge of Security Managers and
1271
Specialists
1272
The training emphasis for staff in the central security
1273
management groups, many of whom came to their groups with
1274
significant technical expertise, was on keeping staff skills and
1275
knowledge current. This was accomplished primarily through
1276
attendance at technical conferences and specialized courses on
1277
topics such as the security features of new software, as well as
1278
networking with other security professionals and reviewing the
1279
latest technical literature and bulletins. To maximize the value of
1280
expenditures on external training and events, one central group
1281
required staff members who attended these events to brief others in
1282
the central group on what they had learned.
1283
In an effort to significantly upgrade the expertise of
1284
information security officers in its various business units, the
1285
central group at the financial services corporation had recently
1286
arranged for an outside firm to provide 5 weeks of training for
1287
these individuals. The training, which is planned to take place in
1288
1-week increments throughout the year, is expected to entail a
1289
broad range of security-related topics, including general
1290
information security, encryption, access control, and how to build
1291
a better working relationship with the corporation's technical
1292
information systems group.
1293
Citing an emerging trend, the senior information security
1294
managers had also started to create information security career
1295
paths and stress professional certification for security
1296
specialists. In particular, many organizations were encouraging
1297
their staff to become Certified Information Systems Security
1298
Professionals (CISSP).5 One security manager noted that security
1299
specialists
1300
5The CISSP certification was established by the International
1301
Information Systems Security Certification Consortium. The
1302
consortium was established as a joint effort of several information
1303
security-related organizations, including the Information Systems
1304
Security Association and the Computer Security Institute, to
1305
develop a certification program for information security
1306
professionals.
1307
Page 38 GAO/AIMD-98-68 Information Security Management
1308
also needed excellent communication skills if they were to
1309
effectively fulfill their roles as consultants and facilitators for
1310
business managers who were less technically expert regarding
1311
computers and telecommunications.
1312
1313
1314
Educate System Administrators
1315
Increasing the expertise of system administrators presented
1316
different challenges. System administrators are important because
1317
they generally perform day-to-day security functions, such as
1318
creating new system user accounts, issuing new passwords, and
1319
implementing new software. These tasks must be completed properly
1320
and promptly or controls, such as passwords and related access
1321
restrictions, will not provide the level of protection intended. In
1322
addition, system administrators are the first line of defense
1323
against security intrusions and are generally in the best position
1324
to notice unusual activity that may indicate an intrusion or other
1325
security incident. However, at the organizations we studied, as at
1326
federal agencies, security is often a collateral duty, rather than
1327
a full-time job, and the individuals assigned frequently have
1328
limited technical expertise. As a result, the effectiveness of
1329
individual system administrators in maintaining security controls
1330
and spotting incidents is likely to vary.
1331
To enhance the technical skills of their security administrators
1332
and help ensure that all of them had the minimal skills needed,
1333
most of the groups had established special training sessions for
1334
them. For example,
1335
the manufacturer required new security administrators to spend 2
1336
to 5 days
1337
in training with the central security group, depending on their
1338
technical
1339
skills, before they were granted authority to perform specific
1340
functions on
1341
the network, such as controlling the users' access rights;
1342
the central security group at the university held annual
1343
technical
1344
conferences for the university's systems administrators and
1345
engaged
1346
professional training organizations to offer on-campus training
1347
at very
1348
reduced rates; and
1349
the state agency held a biannual conference for systems
1350
administrators
1351
that included sessions related to their information security
1352
responsibilities.
1353
1354
1355
Attract and Keep Individuals with Technical Skills
1356
Most of the groups cited maintaining or increasing the technical
1357
expertise among their security staff as a major challenge, largely
1358
due to the high demand
1359
GAO/AIMD-98-68 Information Security Management Page 39
1360
for information technology experts in the job market. In
1361
response, several said they offered higher salaries and special
1362
benefits to attract and keep expert staff. For example, the
1363
financial services corporation provided competitive pay based on
1364
surveys of industry pay levels, attempted to maintain a challenging
1365
work environment, and provided flexible work schedules and
1366
telecommuting opportunities that allowed most of the staff to work
1367
at home 1 day a week. In addition, provisions were made for staff
1368
to do the type of work they preferred, such as software testing
1369
versus giving presentations.
1370
Organizations relied on both internally and externally developed
1371
and presented training courses, sometimes engaging contractors or
1372
others to assist. For example, the state information security
1373
office above the state agency worked with an information security
1374
professional organization to provide a relatively low-cost
1375
statewide training conference. The state organization provided
1376
meeting rooms and administrative support while the professional
1377
organization used its professional contacts to obtain knowledgeable
1378
speakers.
1379
1380
1381
The organizations viewed information security policies as the
1382
foundation of their information security programs and the basis for
1383
adopting specific procedures and technical controls. As with any
1384
area of operations, written policies are the primary mechanism by
1385
which management communicates its views and requirements to its
1386
employees, clients, and business partners. For information
1387
security, as with other types of internal controls, these views and
1388
requirements generally flow directly from risk considerations, as
1389
illustrated in the management cycle depicted above.
1390
As discussed earlier, our discussions with the eight
1391
organizations focused on their methods for developing and
1392
supporting policies and guidelines. We did not discuss the specific
1393
controls they had implemented due to the proprietary and often
1394
highly technical nature of this information.
1395
Practice 9: Link Policies to Business Risks
1396
The organizations stressed the importance of up-to-date policies
1397
that made sense to users and others who were expected to understand
1398
them. Many senior security managers told us that prior to the
1399
recent strengthening of their security programs, their
1400
organization's information security policies had been neglected and
1401
out-of-date, thus failing to address significant risks associated
1402
with their current interconnected computing environment. As a
1403
result, developing a comprehensive set of policies was one of their
1404
first steps in establishing an effective corporatewide security
1405
program. In addition, they emphasized the importance of adjusting
1406
policies continually to respond to newly identified risks or areas
1407
of misunderstanding. For example,
1408
At the financial services corporation, the central security
1409
group routinely
1410
analyzed the causes of security weaknesses identified by
1411
management and
1412
by auditors in order to identify policy and related control
1413
deficiencies.
1414
The university had recently developed more explicit policies on
1415
system
1416
administrator responsibilities in recognition of the critical
1417
role of system
1418
administration in a distributed environment.
1419
The manufacturing company had recently drafted policies on
1420
security
1421
incident response after an incident had exposed shortfalls in
1422
the company's
1423
guidance in this area.
1424
A relatively new risk area receiving particular attention in
1425
organizational policies was user behavior. Many policies are
1426
implemented and, to some extent, enforced by technical controls,
1427
such as logical access controls that prevent individuals from
1428
reading or altering data in an unauthorized manner. However, many
1429
information security risks cannot be adequately mitigated with
1430
technical controls because they are a function of user behavior. In
1431
a networked environment, these risks are magnified because a
1432
problem on one computer can affect an entire network of computers
1433
within minutes and because users are likely to have easier access
1434
to larger amounts of data and the ability to communicate quickly
1435
with thousands of others. For example, users may accidentally
1436
disclose sensitive information to a large audience through
1437
electronic mail or introduce damaging viruses that are subsequently
1438
transmitted to the organizations entire network of computers. In
1439
addition, some users may feel no compunction against browsing
1440
sensitive organizational computer files or inappropriate Internet
1441
sites if there is no clear guidance on what types of user behavior
1442
are acceptable.
1443
To address these risks, many of which did not exist prior to
1444
extensive use of networks, electronic mail, and the Internet, the
1445
organizations had begun placing
1446
GAO/AIMD-98-68 Information Security Management Page 43
1447
more emphasis on user behavior in their policies and guidelines.
1448
For example, the university's policies went beyond the traditional
1449
warnings against password disclosure by including prohibitions
1450
against a variety of possible user actions. These included
1451
misrepresenting their identity in electronic communications and
1452
conducting and promoting personal commercial enterprises on the
1453
network. The senior security officer at this organization noted
1454
that, when rules such as this are aimed at users, it is especially
1455
important that they be stated in clearly understandable, relatively
1456
nontechnical language. The security officers at the computer vendor
1457
said that because the company's information security policies
1458
emphasized user behavior, they were included in the organization's
1459
employee code of conduct.
1460
Practice 10: Distinguish Between Policies and Guidelines
1461
"Detailed guidelines are an important supplement to the official
1462
policies because they educate users and serve as an awareness
1463
tool."
1464
-- Security manager at a prominent financial institution
1465
A common technique for making organizational information
1466
security policies more useful was to divide them into two broad
1467
segments: concise high-level policies and more detailed information
1468
referred to as guidelines or standards. Policies generally outlined
1469
fundamental requirements that top management considered to be
1470
imperative, while guidelines provided more detailed rules for
1471
implementing the broader policies. Guidelines, while encouraged,
1472
were not considered to be mandatory for all business units.
1473
Distinguishing between organizational policies and guidelines
1474
provided several benefits. It allowed senior management to
1475
emphasize the most important elements of information security
1476
policy, provided some flexibility to unit managers, made policies
1477
easier for employees to understand, and, in some cases, reduced the
1478
amount of formal review needed to finalize updated policies.
1479
1480
1481
Guidelines Can Serve As An Educational Tool
1482
Several security managers said that short policies that
1483
emphasized the most important aspects of the organizations security
1484
concerns were more likely to be read and understood than voluminous
1485
and detailed policies. However, they noted that more detailed
1486
guidelines often provided answers to employees' questions and
1487
served as a tool for educating subordinate security managers and
1488
others who wanted a more thorough understanding of good security
1489
practices.
1490
For example, the utility company had distilled the fundamental
1491
components of its information protection policies into less than
1492
one page of text. This narrative (1) stated that "Information is a
1493
corporate asset . . . . Information must be protected according to
1494
its sensitivity, criticality and value, regardless of the media on
1495
which it is stored, the manual or automated systems that process
1496
it, or the methods by which it is distributed," (2) outlined the
1497
responsibilities of information owners, custodians, and users, (3)
1498
defined the organization's three data classification categories,
1499
and (4) stated that each business unit should develop an
1500
information protection program to implement these policies. The
1501
policy
1502
GAO/AIMD-98-68 Information Security Management Page 45
1503
statement then referred the reader to a 73-page reference guide
1504
that provided definitions, recommended guidelines and procedures,
1505
explanatory discussions, and self-assessment questionnaires
1506
designed to assist business units in understanding the need for the
1507
policies and how they could be implemented.
1508
1509
1510
Guidelines Provide for Flexibility
1511
Although the latitude granted to business units varied,
1512
providing both policies and guidelines allowed business units to
1513
tailor the guidelines to their own individual unit's information
1514
protection needs. It also reinforced the business managers' sense
1515
of ownership of their information assets.
1516
For example, the large financial services corporation had
1517
divided its information security rules into "policies" and
1518
"standards." Policies were mandatory, high-level requirements that,
1519
with rare exception, had to be followed. An example of a policy was
1520
that units were required to use commercially developed software
1521
rather than developing unique software inhouse. An example of a
1522
standard at the same institution was a prescribed minimum password
1523
length. At this organization, deviations from policies had to be
1524
documented in a letter signed by both the executive of the business
1525
group requesting the deviation and the central information security
1526
group's manager. However, deviations from standards required only
1527
approval from the group's executive. Such deviations were required
1528
to be documented in a letter and, though not required, were usually
1529
approved by the central security group. All deviations had to be
1530
renewed annually.
1531
Practice 11: Support Policies Through the Central Security
1532
Group
1533
Generally, the central security management groups were
1534
responsible for developing written corporatewide policies in
1535
partnership with business managers, internal auditors, and
1536
attorneys. In addition, the central groups provided related
1537
explanations, guidance, and support to business units. Several
1538
security managers noted that business managers are much more likely
1539
to support centrally developed policies if they clearly address
1540
organizational needs and are practical to implement. For this
1541
reason, these organizations had developed mechanisms for involving
1542
other organizational components in policy documentation.
1543
Most often this involvement was in the form of reviews of policy
1544
drafts. However, the university had established an information
1545
security policy committee that included top university officials,
1546
legal counsel, and representatives from student affairs, faculty
1547
affairs, and internal audit to assist in the development and review
1548
of policies.
1549
The central security management groups played an important role
1550
in ensuring that policies were consistently implemented by serving
1551
as focal points for user questions. By serving as a readily
1552
available resource for organization employees, they helped clear up
1553
misunderstandings and provided guidance on topics that were not
1554
specifically addressed in written guidance.
1555
Most organizations had also made their policies available
1556
through their computer networks so that users could readily access
1557
the most up-to-date version whenever they needed to refer to them.
1558
In addition, many organizations required users to sign a statement
1559
that they had read and understood the organization's information
1560
security policies. Generally, such statements were required from
1561
new users at the time access to information resources was first
1562
provided and from all users periodically, usually once a year. One
1563
security manager thought that requiring such signed statements
1564
served as a useful technique for impressing on the users the
1565
importance of understanding organizational policies. In addition,
1566
if the user was later involved in a security violation, the
1567
statement served as evidence that he or she had been informed of
1568
organizational policies. Additional techniques for communicating
1569
information security policies are discussed in the next section on
1570
promoting awareness.
1571
1572
1573
"Users are much more likely to support and comply with policies
1574
if they clearly understand the purpose for the policies and their
1575
responsibilities in regard to the policies."
1576
-- Information security manager for a state agency
1577
User awareness is essential to successfully implementing
1578
information security policies and ensuring that related controls
1579
are working properly. Computer users, and others with access to
1580
information resources, cannot be expected to comply with policies
1581
that they are not aware of or do not understand. Similarly, if they
1582
are not aware of the risks associated with their organization's
1583
information resources, they may not understand the need for and
1584
support compliance with policies designed to reduce risk. For this
1585
reason, the organizations considered promoting awareness as an
1586
essential element of the risk management cycle.
1587
Practice 12: Continually Educate Users and Others on Risks and
1588
Related Policies
1589
The central groups had implemented ongoing awareness strategies
1590
to educate all individuals who might affect the organization's
1591
information security. These individuals were primarily computer
1592
users, who might be employees; contractors; clients; or commercial
1593
partners, such as suppliers. One organization took an even broader
1594
view, targeting awareness efforts also at custodians and security
1595
guards, after a night security guard accidentally destroyed some
1596
important data while playing games on a computer after hours.
1597
The groups focused their efforts on increasing everyone's
1598
understanding of the risks associated with the organization's
1599
information and the related policies and controls in place to
1600
mitigate those risks. Although these efforts were generally aimed
1601
at encouraging policy compliance, the senior security official at
1602
the retailing company emphasized the importance of improving users'
1603
understanding of risks. She said that her central security group
1604
had recognized that policies, no matter how detailed, could never
1605
address every scenario that might lead to a security incident. As a
1606
result, her overarching philosophy regarding awareness efforts was
1607
that users who thoroughly understood the risks were better equipped
1608
to use good judgment when faced with a potential security breach.
1609
For example, such employees were less likely to be tricked into
1610
disclosing sensitive information or passwords.
1611
This last point highlights one of the most important reasons for
1612
sensitizing computer users and other employees to the importance of
1613
information security. Users disclosing sensitive information or
1614
passwords in response to seemingly innocent requests from strangers
1615
either over the phone or in person can provide intruders easy
1616
access to an organization's information and systems. Such
1617
techniques, often referred to as "social engineering," exploit
1618
users' tendencies to be cooperative and helpful, instead of
1619
guarded, careful, and suspicious, when information is requested.
1620
Without adequate awareness about the risks involved in disclosing
1621
sensitive information, users may volunteer information which can
1622
allow an intruder to circumvent otherwise well-designed access
1623
controls.
1624
Practice 13: Use Attention-Getting and User-Friendly
1625
Techniques
1626
To get their message across, the central security groups used a
1627
variety of training and promotional techniques to make
1628
organizational policies readily accessible, educate users on these
1629
policies, and keep security concerns in the forefront of users'
1630
minds. Techniques used included
1631
intranet websites that communicated and explained information
1632
security
1633
related policies, standards, procedures, alerts, and special
1634
notes;
1635
awareness videos with enthusiastic endorsements from top
1636
management for
1637
the security program to supplement basic guidance, such as the
1638
importance
1639
of backing up files and protecting passwords;
1640
interactive presentations by security staff to various user
1641
groups to market
1642
the services provided by the central information security group
1643
and answer
1644
user questions; and
1645
security awareness day and products with security-related
1646
slogans.
1647
The organizations avoided having once-a-year, one-size-fits-all
1648
security briefings like those seen at many federal agencies. The
1649
security managers said that it was important to relate security
1650
concerns to the specific risks faced by users in individual
1651
business groups and ensure that security was an everyday
1652
consideration.
1653
Case Example - Coordinating Policy Development and Awareness
1654
Activities
1655
After experiencing a significant virus infection in 1989, a
1656
retailing company assigned one of its managers to step up efforts
1657
to promote employee awareness of information security risks and
1658
related organizational policies. Since then, this individual's
1659
responsibilities for information security policy development and
1660
awareness, which had previously been handled on a part-time basis,
1661
have evolved into a full-time "awareness manager position" in the
1662
organization's central security group. The company's response to a
1663
minor incident involving the unintentional release of company
1664
financial data illustrates the compatibility of these roles. To
1665
reduce the chances of a similar incident, the awareness manager
1666
concurrently (1) coordinated the development of a policy describing
1667
organizational data classification standards and (2) developed a
1668
brochure and guidelines to publicize the new standards and educate
1669
employees on their implementation. By coordinating policy
1670
development and awareness activities in this manner, she helps
1671
ensure that new risks and policies are communicated promptly and
1672
that employees are periodically reminded of existing policies
1673
through means such as monthly bulletins, an intranet web site, and
1674
presentations to new employees.
1675
1676
1677
As with any type of business activity, information security
1678
should be monitored and periodically reassessed to ensure that
1679
policies continue to be appropriate and that controls are
1680
accomplishing their intended purpose. Over time, policies and
1681
procedures may become inadequate because of changes in threats,
1682
changes in operations, or deterioration in the degree of
1683
compliance. Periodic assessments or reports on activities can be a
1684
valuable means of identifying areas of noncompliance, reminding
1685
employees of their responsibilities, and demonstrating management's
1686
commitment to the security program.
1687
The organizations we studied had recognized that monitoring
1688
control effectiveness and compliance with policies is a key step in
1689
the cycle of managing information security. Accordingly, they
1690
monitored numerous factors associated with their security programs,
1691
and they used the results to identify needed improvements. They
1692
used various techniques to do this, and several mentioned their
1693
efforts to identify, evaluate, and implement new, more effective
1694
tools as they become available. Such tools include software that
1695
can be used to automatically monitor control effectiveness and
1696
information systems activity. In addition, several of the security
1697
managers expressed interest in improving their ability to more
1698
precisely measure the costs and benefits of security-related
1699
activities so that their organizations could better determine which
1700
controls and activities were the most cost effective.
1701
GAO/AIMD-98-68 Information Security Management Page 53
1702
Practice 14: Monitor Factors that Affect Risk and Indicate
1703
Security Effectiveness
1704
The organizations focused their monitoring efforts primarily on
1705
(1) determining if controls were in place and operating as intended
1706
to reduce risk and
1707
(2) evaluating the effectiveness of the security program in
1708
communicatingpolicies, raising awareness levels, and reducing
1709
incidents. As discussed below, these efforts included testing
1710
controls, monitoring compliance with policies, analyzing security
1711
incidents, and accounting for procedural accomplishments and other
1712
indicators that efforts to promote awareness were effective.
1713
1714
Testing the Effectiveness of Controls
1715
Directly testing control effectiveness was cited most often as
1716
an effective way to determine if the risk reduction techniques that
1717
had been agreed to were, in fact, operating effectively. In keeping
1718
with their role as advisors and facilitators, most of the security
1719
managers said that they relied significantly on auditors to test
1720
controls. In these cases, the central security management groups
1721
kept track of audit findings related to information security and
1722
the organization's progress in implementing corrective actions.
1723
However, several of the central security groups also performed
1724
their own tests. For example, the central security group at the
1725
university periodically ran a computer program designed to detect
1726
network vulnerabilities at various individual academic departments
1727
and reported weaknesses to department heads. A subsequent review
1728
was performed a few months later to determine if weaknesses had
1729
been reduced. The central security manager told us that she
1730
considered the tests, which could be performed inexpensively by her
1731
staff, a cost-effective way to evaluate this important aspect of
1732
security and provide a service to the academic departments, which
1733
were ultimately responsible for the security of their departments'
1734
information and operations.
1735
Several organizations periodically tested system and network
1736
access controls by allowing designated individuals to try to "break
1737
into" their systems using the latest hacking techniques. This type
1738
of testing is often referred to as penetration testing. The
1739
individuals performing the tests, which at various organizations
1740
were internal auditors, contractors, student interns, or central
1741
security staff, were encouraged to research and use hacking
1742
instructions and tools available on the Internet or from other
1743
sources in order to simulate attacks from real hackers. By allowing
1744
such tests, the organizations could readily identify previously
1745
unknown vulnerabilities and either eliminate them or make
1746
adjustments in computer and network use to lessen the risks.
1747
One organization had performed annual tests of its disaster
1748
recovery plan to identify and correct plan weaknesses. A recent
1749
test was particularly effective because it involved a comprehensive
1750
simulation of a real disaster. The test involved staging a surprise
1751
"bomb scare" to get employees, who were unaware that the threat was
1752
a pretense, to evacuate the building. After the employees had
1753
evacuated, they were told that they were participating in a test,
1754
that they were to assume that a bomb had actually destroyed their
1755
workplace, and to proceed with emergency recovery plans. The test,
1756
which was organized by the agency's contingency planning group,
1757
proved extremely successful in identifying plan weaknesses and in
1758
dramatically sensitizing employees to the value of anticipating and
1759
being prepared for such events.
1760
1761
1762
1763
Monitoring Compliance With Policies and Guidelines
1764
All of the organizations monitored compliance with
1765
organizational policies to some extent. Much of this monitoring was
1766
achieved through informal feedback to the central security group
1767
from system administrators and others in other organizational
1768
units. However, a few organizations had developed more structured
1769
mechanisms for such monitoring. For example, the utility company
1770
developed quarterly reports on compliance with organizational
1771
policies, such as the number of organizational units that had
1772
tailored their own information protection policies as required by
1773
corporate-level policy. Also, several organizations said that they
1774
had employed self-assessment tools, such as the Computer Security
1775
Institute's "Computer Security Compliance Test," to compare their
1776
organization's programs to preestablished criteria.
1777
1778
1779
Accounting For and Analyzing Security Incidents
1780
Keeping summary records of actual security incidents is one way
1781
that an organization can measure the frequency of various types of
1782
violations as well as the damage suffered from these incidents.
1783
Such records can provide valuable input for risk assessments and
1784
budgetary decisions.
1785
Although all of the organizations kept at least informal records
1786
on incidents, those that had formalized the process found such
1787
information to be a valuable resource. For example, at the nonbank
1788
financial institution, the central security manager kept records on
1789
viruses detected and eradicated, including estimates of the cost of
1790
potential damage to computer files that was averted by the use of
1791
virus detection software. This information was then used to justify
1792
annual budget requests when additional virus detection software was
1793
needed. However, as discussed in the following case example, the
1794
university had developed the most comprehensive procedures for
1795
accounting for and analyzing security incidents.
1796
1797
Case Example: Developing an Incident Database
1798
A university's central security group had developed a database
1799
that served as a valuable management tool in monitoring problems,
1800
reassessing risks, and determining how to best use limited
1801
resources to address the most significant information security
1802
problems. The database accounted for the number of information
1803
security incidents that had been reported, the types of incidents,
1804
and actions taken to resolve each incident, including disciplinary
1805
actions. At the time of our visit, in February 1997, incidents were
1806
categorized into 13 types, which generally pertained to the
1807
negative effects of the violations. Examples included denial of
1808
service, unauthorized access, data compromise, system damage,
1809
copyright infringement, and unauthorized commercial activity.
1810
By keeping such records, the central group could develop monthly
1811
reports that showed increases and decreases in incident frequency,
1812
trends, and the status of resolution efforts. This, in turn,
1813
provided the central security group a means of
1814
(1) identifying emerging problems, (2) assessing the
1815
effectiveness of current policiesand awareness efforts, (3)
1816
determining the need for stepped up education or new controls to
1817
address problem areas, and (4) monitoring the status of
1818
investigative and disciplinary actions to help ensure that no
1819
individual violation was inadvertently forgotten and that
1820
violations were handled consistently.
1821
The means of maintaining the database and the details that it
1822
contained had changed as the number of reported incidents at the
1823
university had grown--from 3 or 4 a month in 1993 to between 50 and
1824
60 a month in early 1997--and as the database's value as a
1825
management tool became more apparent. Records originally maintained
1826
in a paper logbook had been transferred to a personal computer, and
1827
information on follow-up actions had recently been expanded.
1828
The university's senior security officer noted that the database
1829
could be augmented to provide an even broader range of security
1830
management information. For example, while the university did not
1831
develop data on the actual cost of incidents, such as the cost of
1832
recovering from virus infections, the database could be used to
1833
compile such information, which would be useful in measuring the
1834
cost of security lapses and in determining how much to spend on
1835
controls to reduce such lapses.
1836
1837
1838
1839
Monitoring the Effectiveness of the Central Security Management
1840
Group
1841
Several of the central security groups had developed measures of
1842
their own activities, outputs, and expertise as an indication of
1843
their effectiveness. Examples of these items included
1844
the number of calls from users, indicating knowledge of and
1845
respect for
1846
security specialists;
1847
the number of security-related briefings and training sessions
1848
presented;
1849
the number of risk assessments performed;
1850
the number of security managers and systems administrators who
1851
were
1852
Certified Information System Security Professionals; and
1853
the number of courses and conferences held or attended.
1854
1855
1856
Emerging Interest in More Precisely Measuring Cost and
1857
Benefits
1858
Several of the security managers expressed an interest in
1859
developing better measurement capabilities so that they could more
1860
precisely measure the ultimate benefits and drawbacks of
1861
security-related policies and controls--that is, the positive and
1862
negative affects of information security on business operations.
1863
However, they said that such measurements would be difficult
1864
because it is costly to do the research and recordkeeping necessary
1865
to develop information on (1) the full cost of controls--both the
1866
initial cost and operational inefficiencies associated with the
1867
controls--and (2) the full cost of incidents or problems resulting
1868
from inadequate controls. Further, as discussed previously
1869
regarding risk assessment, actual reductions in risk cannot be
1870
precisely quantified because sufficient data on risk factors are
1871
not available.
1872
In an effort to more thoroughly explore this topic, we expanded
1873
our discussions beyond the eight organizations that were the
1874
primary subjects of our study by requesting the Computer Security
1875
Institute to informally poll its most active members on this
1876
subject. We also discussed assessment techniques with experts at
1877
NIST. Although we identified no organizations that had made
1878
significant progress in applying such measures, we found that more
1879
precisely measuring the positive and negative effects of security
1880
on business operations is an area of developing interest among many
1881
information security experts. For this reason, improved data and
1882
measurement techniques may be available in the future.
1883
GAO/AIMD-98-68 Information Security Management Page 57
1884
Practice 15: Use Results to Direct Future Efforts and Hold
1885
Managers Accountable
1886
Although monitoring, in itself, may encourage compliance with
1887
information security policies, the full benefits of monitoring are
1888
not achieved unless results are used to improve the security
1889
program. Analyzing the results of monitoring efforts provides
1890
security specialists and business managers a means of
1891
1892
1893
(1)
1894
reassessing previously identified risks, (2) identifying
1895
new problem areas,
1896
1897
1898
(3)
1899
reassessing the appropriateness of existing controls and
1900
security-relatedactivities, (4) identifying the need for new
1901
controls, and (5) redirecting subsequent monitoring efforts. For
1902
example, the central security group at the utility redirected its
1903
training programs in response to information security weaknesses
1904
reported by its internal auditors. Similarly, security specialists
1905
at the manufacturing company recently visited one of the company's
1906
overseas units to assist in resolving security weaknesses
1907
identified by internal auditors. The previously cited example of
1908
using records on virus incidents to determine the need for
1909
virus-detection software also illustrates this point.
1910
1911
1912
Results can also be used to hold managers accountable for their
1913
information security responsibilities. Several organizations had
1914
developed quarterly reporting mechanisms to summarize the status of
1915
security-related efforts. However, the financial services
1916
corporation provided the best example of how periodic reports of
1917
results can be used to hold managers accountable for understanding,
1918
as well as reducing, the information security risks to their
1919
business units. A description of this process is provided in the
1920
following case example.
1921
1922
Case Example: Measuring Control Effectiveness and Management
1923
Awareness
1924
At a major financial services corporation, managers are expected
1925
to know what their security problems are and to have plans in place
1926
to resolve them. To help ensure that managers fulfill this
1927
responsibility, they are provided self-assessment tools that they
1928
can use to evaluate the information security aspects of their
1929
operations. When weaknesses are discovered, the business managers
1930
are expected to either improve compliance with existing policies or
1931
consult with the corporation's security experts regarding the
1932
feasibility of implementing new policies or control techniques.
1933
Ratings based on audit findings serve as an independent measure
1934
of control effectiveness and management awareness. At the start of
1935
every audit, the auditors ask the pertinent business managers what
1936
weaknesses exist in their operations and what corrective actions
1937
they have deemed necessary and have planned. After audit work is
1938
complete, the auditors compare their findings with management's
1939
original assertions to see if management was generally aware of all
1940
of the weaknesses prior to the audit. The auditors then develop two
1941
ratings on a scale of 1 to 5: One rating to indicate the
1942
effectiveness of information security controls and a second rating
1943
to indicate the level of management awareness. If the auditors
1944
discover serious, but previously unrecognized weaknesses, the
1945
management awareness rating will be lowered. However, if the
1946
auditor finds no additional weaknesses, management will receive a
1947
good awareness rating, even if controls need to be
1948
strengthened.
1949
These ratings are forwarded to the CEO and to the board of
1950
directors, where they can be used as performance measures.
1951
According to the bank's central security manager, the bank
1952
chairman's goal is for all business units to have favorable ratings
1953
(4 or 5) in both categories. Such a rating system provides not only
1954
a measure of performance and awareness, but it also places primary
1955
responsibility for information security with the managers whose
1956
operations depend on it. Further, it recognizes the importance of
1957
identifying weaknesses and the risk they present, even when they
1958
cannot be completely eliminated.
1959
Practice 16: Be Alert to New Monitoring Tools and Techniques
1960
The security specialists said that they were constantly looking
1961
for new tools to test the security of their computerized
1962
operations. Two security managers noted that their organizations
1963
had implemented new, more sophisticated, software tools for
1964
monitoring network vulnerabilities. However, several security
1965
managers said that the development of automated monitoring tools is
1966
lagging behind the introduction of new computer and network
1967
technologies and that this has impaired their efforts to detect
1968
incidents, especially unauthorized intrusions. Similarly, as
1969
discussed previously, managers are looking for practical techniques
1970
for more precisely measuring the value of security controls and
1971
obtaining better data on risk factors. In such an environment, it
1972
is essential that (1) security specialists keep abreast of
1973
developing techniques and tools and the latest information about
1974
system vulnerabilities and (2) senior executives ensure they have
1975
the resources to do this.
1976
Several security managers told us that, in addition to reading
1977
current professional literature, their involvement with
1978
professional organizations was a valuable means of learning about
1979
the latest monitoring tools and research efforts. Examples of such
1980
organizations included the Computer Security Institute, Information
1981
Systems Security Association, the Forum of Incident Response and
1982
Security Teams, and less formal discussion groups of security
1983
professionals associated with individual industry segments. Several
1984
security managers said that by participating in our study, they
1985
hoped to gain insights on how to improve their information security
1986
programs.
1987
1988
1989
1990
1991
1992
1993
Conclusion
1994
"We are on the verge of a revolution that is just as profound as
1995
the change in the economy that came with the industrial revolution.
1996
Soon electronic networks will allow people to transcend the
1997
barriers of time and distance and take advantage of global markets
1998
and business opportunities not even imaginable today, opening up a
1999
new world of economic possibility and progress."
2000
Vice President Albert Gore, Jr., in the Administration's July
2001
1997 report, A Framework For Global Electronic Commerce
2002
To achieve the benefits offered by the new era of computer
2003
interconnectivity, the federal government, like other
2004
organizational entities and individuals, must find ways to address
2005
the associated security implications. Individual security controls
2006
and monitoring tools will change as technology advances, and new
2007
risks are likely to emerge. For this reason, it is essential that
2008
organizations such as federal agencies establish management
2009
frameworks for dealing with these changes on an ongoing basis.
2010
Developing an information security program that adheres to the
2011
basic principles outlined in this guide is the first and most basic
2012
step that an agency can take to build an effective security
2013
program. In this regard, agencies must continually (1) explore and
2014
assess information security risks to business operations, (2)
2015
determine what policies, standards, and controls are worth
2016
implementing to reduce these risks, (3) promote awareness and
2017
understanding among program managers, computer users, and systems
2018
development staff, and
2019
(4) assess compliance and control effectiveness. As with other
2020
types of internal controls, this is a cycle of activity, not an
2021
exercise with a defined beginning and end.
2022
By instituting such a management framework, agencies can
2023
strengthen their current security posture, facilitate future system
2024
and process improvement efforts, and more confidently take
2025
advantage of technology advances.
2026
Appendix I
2027
2028
2029
GAO Guides on Information Technology Management
2030
Executive Guide: Measuring Performance and Demonstrating Results
2031
of Information Technology Investments (GAO/AIMD-98-89, March
2032
1998)
2033
Year 2000 Computing Crisis: Business Continuity and Contingency
2034
Planning (Exposure Draft, GAO/AIMD-10.1.19, February 1998)
2035
Year 2000 Computing Crisis: An Assessment Guide
2036
(GAO/AIMD-10.1.14, September 1997)
2037
Business Process Reengineering Assessment Guide
2038
(GAO/AIMD-10.1.15, April 1997, Version 3)
2039
Assessing Risks and Returns: A Guide for Evaluating Federal
2040
Agencies' IT Investment Decision-making (GAO/AIMD-10.1.13, February
2041
1997, Version 1)
2042
Executive Guide: Improving Mission Performance Through Strategic
2043
Information Management and Technology (GAO/AIMD-94-115, May
2044
1994)
2045
Appendix II
2046
2047
2048
NIST's Generally Accepted Principles and Practices for Securing
2049
Information Technology Systems
2050
To provide a common understanding of what is needed and expected
2051
in information technology security programs, NIST developed and
2052
published Generally Accepted Principles and Practices for Securing
2053
Information Technology Systems (Special Pub 800-14) in September
2054
1996.6 Its eight principles are listed below.
2055
2056
2057
1.
2058
Computer Security Supports the Mission of the
2059
Organization
2060
2061
2062
2.
2063
Computer Security Is an Integral Element of Sound
2064
Management
2065
2066
2067
3.
2068
Computer Security Should Be Cost-Effective
2069
2070
2071
4.
2072
Systems Owners Have Security Responsibilities Outside
2073
Their Own Organizations
2074
2075
2076
5.
2077
Computer Security Responsibilities and Accountability
2078
Should Be Made Explicit
2079
2080
2081
6.
2082
Computer Security Requires a Comprehensive and Integrated
2083
Approach
2084
2085
2086
7.
2087
Computer Security Should Be Periodically
2088
Reassessed
2089
2090
2091
8.
2092
Computer Security Is Constrained by Societal
2093
Factors
2094
2095
2096
At the time of publication, this document, along with other
2097
publications pertaining to information security, was available on
2098
NIST's Computer Security Resource Clearinghouse internet page at
2099
http://csrc.nist.gov/publications.html. The listed documents are
2100
also available through either the Government Printing Office or the
2101
National Technical Information Service, for more information call
2102
(202) 783-3238 or (703) 487-4650, respectively.
2103
Page 64 GAO/AIMD-98-68 Information Security Management
2104
Appendix III
2105
2106
2107
Major Contributors to This Executive Guide
2108
Accounting and Jean Boltz, Assistant Director, (202) 512-5247
2109
Michael W. Gilmore, Information Systems Analyst
2110
2111
2112
Information
2113
Management Ernest A. Döring, Senior Evaluator
2114
2115
2116
Division Washington, D.C.
2117
2118
2119
GAO Reports and Testimonies on Information Security Issued
2120
Since September 1993
2121
U.S. Government Financial Statements: Results of GAO's Fiscal
2122
Year 1997 Audit (GAO/T-AIMD-98-128, April 1, 1998)
2123
Financial Audit: 1997 Consolidated Financial Statements of the
2124
United States Government (GAO/AIMD-98-127, March 31, 1998)
2125
Financial Audit: Examination of IRS' Fiscal Year 1996 Custodial
2126
Financial Statements (GAO/AIMD-98-18, December 24, 1997)
2127
Financial Management: Review of the Military Retirement Trust
2128
Fund's Actuarial Model and Related Computer Controls
2129
(GAO/AIMD-97-128, September 9, 1997)
2130
Financial Audit: Examination of IRS' Fiscal Year 1996
2131
Administrative Financial Statements (GAO/AIMD-97-89, August 29,
2132
1997)
2133
Social Security Administration: Internet Access to Personal
2134
Earnings and Benefits Information (GAO/T-AIMD/HEHS-97-123, May 6,
2135
1997)
2136
IRS Systems Security and Funding: Employee Browsing Not Being
2137
Addressed Effectively and Budget Requests for New Systems
2138
Development Not Justified (GAO/T-AIMD-97-82, April 15, 1997)
2139
IRS Systems Security: Tax Processing Operations and Data Still
2140
at Risk Due to Serious Weaknesses (GAO/T-AIMD-97-76, April 10,
2141
1997)
2142
IRS Systems Security: Tax Processing Operations and Data Still
2143
at Risk Due to Serious Weaknesses (GAO/AIMD-97-49, April 8,
2144
1997)
2145
High Risk Series: Information Management and Technology
2146
(GAO/HR-97-9, February 1997)
2147
Information Security: Opportunities for Improved OMB Oversight
2148
of Agency Practices (GAO/AIMD-96-110, September 24, 1996)
2149
Financial Audit: Examination of IRS' Fiscal Year 1995 Financial
2150
Statements (GAO/AIMD-96-101, July 11, 1996)
2151
Tax Systems Modernization: Actions Underway But IRS Has Not Yet
2152
Corrected Management and Technical Weaknesses (GAO/AIMD-96-106,
2153
June 7, 1996)
2154
Information Security: Computer Hacker Information Available on
2155
the Internet (GAO/T-AIMD-96-108, June 5, 1996)
2156
Information Security: Computer Attacks at Department of Defense
2157
Pose Increasing Risks (GAO/AIMD-96-84, May 22, 1996)
2158
Information Security: Computer Attacks at Department of Defense
2159
Pose Increasing Risks (GAO/T-AIMD-96-92, May 22, 1996)
2160
Security Weaknesses at IRS' Cyberfile Data Center
2161
(GAO/AIMD-96-85R, May 9, 1996)
2162
Tax Systems Modernization: Management and Technical Weaknesses
2163
Must Be Overcome To Achieve Success (GAO/T-AIMD-96-75, March 26,
2164
1996)
2165
Financial Management: Challenges Facing DOD in Meeting the Goals
2166
of the Chief Financial Officers Act (GAO/T-AIMD-96-1, November 14,
2167
1995)
2168
Financial Audit: Examination of IRS' Fiscal Year 1994 Financial
2169
Statements (GAO/ AIMD-95-141, August 4, 1995)
2170
Federal Family Education Loan Information System: Weak Computer
2171
Controls Increase Risk of Unauthorized Access to Sensitive Data
2172
(GAO/AIMD-95-117, June 12, 1995)
2173
Department of Energy: Procedures Lacking to Protect Computerized
2174
Data (GAO/AIMD-95-118, June 5, 1995)
2175
Financial Management: Control Weaknesses Increase Risk of
2176
Improper Navy Civilian Payroll Payments (GAO/AIMD-95-73, May 8,
2177
1995)
2178
Information Superhighway: An Overview of Technology Challenges
2179
(GAO/AIMD-95-23, January 23, 1995)
2180
Information Superhighway: Issues Affecting Development
2181
(GAO/RCED-94-285, September 30, 1994)
2182
IRS Automation: Controlling Electronic Filing Fraud and Improper
2183
Access to Taxpayer Data (GAO/T-AIMD/GGD-94-183, July 19, 1994)
2184
Financial Audit: Federal Family Education Loan Program's
2185
Financial Statements for Fiscal Years 1993 and 1992
2186
(GAO/AIMD-94-131, June 30, 1994)
2187
Financial Audit: Examination of Customs' Fiscal Year 1993
2188
Financial Statements (GAO/AIMD-94-119, June 15, 1994)
2189
Financial Audit: Examination of IRS' Fiscal Year 1993 Financial
2190
Statements (GAO/AIMD-94-120, June 15, 1994)
2191
HUD Information Resources: Strategic Focus and Improved
2192
Management Controls Needed (GAO/AIMD-94-34, April 14, 1994)
2193
Financial Audit: Federal Deposit Insurance Corporation's
2194
Internal Controls as of December 31, 1992 (GAO/AIMD-94-35, February
2195
4, 1994)
2196
Financial Management: Strong Leadership Needed to Improve Army's
2197
Financial Accountability (GAO/AIMD-94-12, December 22, 1993)
2198
Communications Privacy: Federal Policy and Actions
2199
(GAO/OSI-94-2, November 4, 1993)
2200
IRS Information Systems: Weaknesses Increase Risk of Fraud and
2201
Impair Reliability of Management Information (GAO/AIMD-93-34,
2202
September 22, 1993)
2203
Document Security: Justice Can Improve Its Controls Over
2204
Classified and Sensitive Documents (GAO/GGD-93-134, September 7,
2205
1993)
2206
2207
2208
2209
2210
2211
2212