Sunday, September 28, 2008

LESSONS FROM CONDUCTING A SECURITY GAP ANALYSIS

There are many reasons for ensuring that you have a secure information system. It becomes a question of how instead of why. How do you create and maintain a secure system?

I participated in my first security gap analysis project in 2006, blogged it that year, lost that blog, and found my notes again. It was an eye-opening experience especially since it was conducted in one of the largest hospitals—whether public or private—in the country. It serves the second most populous county in the U.S. According to 2006 US Census Bureau estimates, the county had 5.3 million residents—larger than the populations of 29 individual U.S. states or the combined populations of the six smallest US states.

There are many reasons for ensuring that you have a secure information system. It becomes a question of how instead of why. How do you create and maintain a secure system? Starting with what you have, the first step is to create a baseline—a model of your expectations about the security of your information system. If your business belongs to one of several industries that are governed by laws and regulations then you should start with the security requirements of those same laws and regulations.

A hospital, for instance, would be directly governed by the Health Insurance Portability & Accountability Act (HIPAA). It is also subject to other regulations like the eDiscovery rules but we will keep it simple by focusing on HIPAA alone.

The second step is to categorize the sensitivity of your data, identify its source, its location within the system, how its accessed, and who can access it.

Sensitive data can take the form of intellectual property. For a hospital, sensitive data is frequently legally protected. An example is the X-ray images of a patient.

Armed with this information, you can begin your gap analysis. Before this discussion goes further, it must be understood that gap analysis is an ongoing process. The environment is constantly changing. Your information system is constantly changing with it and, naturally, your security gaps are changing as well.

Comparing your actual practices with security requirements will identify the gaps in your system. Once identified, the gaps can be prioritized (by severity, for instance). Then a plan can be created for eliminating (or at least minimizing) those vulnerabilities.

Gap analysis is a specialized form of risk analysis. Risk analysis recognizes the fact that risks are everywhere and that you have limited resources to deal with them. The goal of risk analysis, therefore, is to learn how to deploy your resources in the most effective manner to eliminate or minimize the worst or most likely threats.

It is best to approach gap analysis as a project and like any project, senior management must support it. Security gap analysis must be conducted on a regular basis. It must be thorough and objective. The degree of thoroughness will establish the scope of the analysis. Will the project include physical as well as electronic security? Will it be limited to customer-facing applications?


Objectivity requires a fresh set of eyes. It wouldn’t make sense for an accountant to audit himself. It makes a lot of sense therefore to hire an outside firm to lead the project.

These are the lessons I learned when we conducted a security gap analysis at one of the largest hospitals—whether public or private—in the country.

Our presence was announced with a bang! When you stage a systems break-in, attack the system like a team of hackers would. A team attack is just as likely to happen in real life as a solitary attempt would. The ease and speed of our break-in convinced the hospital’s administration of the risks it faced.

Your project team should have members from different disciplines. I came away convinced that if the core team could only have two groups then the two should be your IT and your HR departments. Why HR? It’s because people will be the primary source of vulnerabilities.

Hospitals are very politicized organizations. In addition to having senior management’s blessing, we created a RACI matrix that was jointly accepted by all department heads.

RACI stands for Responsible-Accountable-Consulted-Informed. A RACI matrix will identify the authority and responsibility of all roles involved in the project. We had determined that our scope was going to be limited to electronic security and to customer-facing applications only. Due to the size of the hospital and the number of applications it ran, our gap analysis focused on the two most heavily implemented applications: lab and accounting.

This was the first gap analysis conducted on this hospital and the spotlight was on it. (And did it ever need it!)

WE ANALYZED THE GAP IN FIVE AREAS

FIRST AREA

AAA – Authorization, Access, and Accounting on an enterprise level. This included single sign-on, a primary aspect of federated identity. Our goal was to standardize the security infrastructure. We discovered numerous instances where Nurse-A could log in at Station-1, stay logged in while logging in again as herself at Station-2, and be granted a different access level.

All current authentication processes were reviewed. Possible vendor solutions were evaluated. A general implementation plan was developed.

SECOND AREA

Awareness. How security-conscious are the employees? Did they know about the different security levels of information?
  1. Unclassified
  2. Classified
  3. Confidential
  4. Restricted
  5. Secret
  6. Top Secret
Our goal was to heighten the security awareness of workers throughout the organization. Make it clear that this is everyone’s responsibility and request for their cooperation. A regular familiarization course was developed and all employees have to attend it every six months. A hotline was also established.

THIRD AREA

Incident Notification & Response. The security awareness course and the hotline are just two of the responsibilities of a new IT-based group. Our goal was to create a first-response team and proactive overseer of enterprise security. They did not make policy; instead they implemented it. At the same time, they tracked actual user practices, compared it to best practices, and submitted progress reports to the Chief Security Officer (a position that was newly created).

FOURTH AREA

Technical Security. We conducted a comprehensive review of the existing security framework. The framework covered firewalls, DMZs, intrusion detection & prevention tools, and the like. Security logs were audited. Patch management was taken seriously. Password policies were enacted. Our goal was to optimize the hospital’s technical security. These efforts were primarily focused at the hospital’s data center. Technical security briefly touched on Disaster Recovery but DR was going to be a separate project.

FIFTH AREA

Best Practices. Our objective was to train users to work using best practices. This was easier said than done since this was change management and most of the staff were lifers, i.e., employees of long tenure. We had to start over several times. In the end, we learned that the best way to coax them to accept change was to first listen to them. This is the area where our business analysts really proved their worth!

CONCLUSION

Several areas above, e.g., Technical Security and Best Practices, were longer and more difficult than expected. The entire project took eight months—two months past schedule and 40% over budget! The core project team consisted of three full-time members. I was one of them.

Would I consider it successful? Yes. We achieved the project's goals. Were the customers happy? The end-users were. Management was not. From the beginning, we articulated to senior management that they had an unrealistic schedule especially because they were ripping out an old application software system. Delays cost money.

At the project onset, they practiced an all too familiar but ill-advised tactic. They asked us for a "realistic" budget. We were outside consultants. Specifically we were the subcontractors of a (politically-connected) contractor. We used parametric and bottom-up estimates, got the agreement from our contractor, and we jointly submitted it to hospital management.

I remember the incident vividly. We were in the office of the hospital administrator. He glanced at it, asked us a few questions, crossed out our figure, deducted 30%, and wrote that down and signed off beside his scribbled amount. Furthermore, he slashed a month of our projected schedule.


Sphere: Related Content

Tuesday, September 23, 2008


TAG CLOUD


This shows the blog's content, organized by word count. Larger words appeared more frequently in the blog.

created at TagCrowd.com
Sphere: Related Content

Monday, September 1, 2008


ITIL: MY INTRODUCTION. PART-2 OF 3

Earlier I mentioned how impressed I was with the value that ITIL can bring to any organization. My positive impression led me to research it a little more—just enough so that I would get the big picture.

The beauty of ITIL, as mentioned previously, lies in its customizability. It specifies the framework, which means that while ITIL reveals the main outline of each best practice, it leaves substantial parts of the solution for you to fill in.

It should be possible to implement ITIL’s best practices using nothing more than Microsoft Office and a team of really dedicated evangelists. In order to implement these best practices, an organization needs a software tool, a team of evangelists, and a project plan.

ITIL needs a central repository for the knowledge and lessons learned by the organization. This repository takes the form of a database called the Configuration Management DataBase (CMDB). It is conceivable therefore, to use MS Office’s Access database for the CMDB. Of course, you should at least have a back-end SQL server to support it.

But don’t do it unless you have a small organization like a medical practice that has 10 physicians working together in one, maybe two, locations. Or, to put it another way, don’t do it unless the organization has an IT staff of two or three. I’m titillated by the idea but that would be a shoestring operation and wages may outweigh the cost of purchasing a dedicated ITIL software package. In short, I think it is feasible even though I have never heard of an implementation in such a small scale.

In order to implement ITIL effectively, the organization must maintain that CMDB and leverage it aggressively to share information to everyone in the organization about changes to existing processes, best practices that were adopted, standards that were set, timelines, etc. It is also important for the project team to roll out ITIL’s best practices in a sensible manner. The best practices should target related functions so that the improvements are quickly felt by the user organization. That will make it easier to adopt and, ultimately, shorten the time before the organization reaps the benefits.

WHAT ARE BEST PRACTICES ANYWAY?

If a user’s desktop starts malfunctioning, does the organization have a procedure that the user can follow confidently? In other words, can the user pick up the phone and call a service desk to report that her desktop isn’t working? And, when someone from IT picks it up, will she receive a loaner until her desktop is fixed and returned to her? Will the majority of her files be accessible through that loaner because the staff has been trained to save all of their files to a central server?

Those are all practices. In fact, those are all best practices. Note several things. First, the user has confidence in the procedure. Second, the process of receiving the loaner and setting it up for the user should take an hour or two—a quick response, in other words. And third, the user’s ability to access her files is possible only because of another practice, namely, saving user files to a central server.

None of these practices need special software to implement, correct? But how many organizations can execute this process consistently? Not many, would you agree?

This is why ITIL was developed. It is a compilation of the best practices for each conceivable function of the IT organization. These practices have one common goal—maximizing the value of IT’s services to its parent organization. ITIL accomplishes this by establishing a common language of terms and a set of service standards.

THE BIG PICTURE

The big picture I mentioned earlier consists of five major domains:

Service Support, which includes
  1. Service Desk
  2. Incident management
  3. Problem management
  4. Change management
  5. Configuration management
  6. Release management
Service Delivery
  1. Service Level management
  2. Financial management of IT services
  3. Capacity management
  4. Availability management
  5. IT service continuity management
Business Perspective

Information & Communications Technology Infranstructure management

Software asset management


See Part-3 of 3 for an overview of the individual components.


Sphere: Related Content