Managerial and Technical
Draft Outline
2/17/00
1.0 Threats
1.1 Current and projected threats
1.2 Need for on-going threat analysis
2.0 Technical Guidelines for Security Policy
2.1 Identification and authentication
- 2.1.1 registration
-
- 2.1.2 maintenance, including revocations, renewals and updates
-
- 2.1.3 authentication technology alternatives
-
- 2.1.3.1 biometrics
-
- 2.1.3.2 PKI and digital certificates
-
- 2.1.3.3 directories
-
- 2.1.3.4 passwords and secrets
-
- 2.1.3.4.1 Too many passwords - the problem and possible
solutions
-
- 2.1.3.5 two and three factor authentication, including physical
tokens (physical possession)
2.2 authorization and access control
- 2.2.1 employee authorization, access controls and policy
-
- 2.2.2 consumer authorization, access controls and policy
2.3 relationship between authentication and authorizations
2.4 confidentiality
- 2.4.1 encryption in transit needs
-
- 2.4.2 encryption of stored data needs
-
- 2.4.3 technology considerations
-
- 2.4.4 encryption policy
2.5 integrity
2.6 non-repudiation
2.7 Fraud detection and containment
- 2.7.1 anomaly detection
-
- 2.7.2 use of agent technology to monitor and enforce
2.8 System security issues
- 2.8.1 Component selection
-
- 2.8.2 Operating system selection
-
- 2.8.2.1 OS Version
-
- 2.8.2.2 Patch level
-
- 2.8.3 OS lockdown
-
- 2.8.3.1 Primary services (i.e. the work that the system
is supposed to perform)
-
- 2.8.3.2 Secondary services (i.e. services required
within the context of the hosting agency)
-
- 2.8.3.3 Maintenance services (i.e. how maintenance
login, backups, etc. are performed)
-
- 2.8.4 Service software
-
- 2.8.4.1 Software selection
-
- 2.8.4.2 Software installation standards
-
- 2.8.5 Custom software (i.e. specific CGI scripts or
Java, or whatever)
-
- 2.8.5.1 Language selection
-
- 2.8.5.2 Security code review
-
- 2.8.6 Change management
-
- 2.8.6.1 Regular maintenance
-
- 2.8.6.2 System upgrades
-
- 2.8.6.3 Emergency maintenance
-
- 2.8.6.4 Third-party maintenance access
-
- 2.8.7 System security auditing standards
-
- 2.8.7.1 Self-audits
-
- 2.8.7.2 Third-party audits
-
- 2.8.8 Anti virus software and firewalls
-
- 2.8.8.1 Selection
-
- 2.8.8.2 Installation
-
- 2.8.8.3 Maintenance
2.9 Trade-offs and compromises between stronger security and
privacy
- 2.9.1 ease of use
-
- 2.9.2 cost/affordability
-
- 2.9.3 portability
-
- 2.9.4 vulnerability and risk exposure
3.0 Managerial Guidelines for Security Policy
3.1 policy and best practices
3.2 organization
3.3 personnel, including selection and background
investigation
3.4 asset classification and control
3.5 physical security
3.6 system access controls
3.7 network and computer management
3.8 application development and maintenance
3.9 business continuity (back-up and recovery, disaster
planning)
3.10 compliance
3.11 Audit and monitoring
- 3.11.1 Keep records and tracking security violations
-
- 3.11.2 reporting procedures and information sharing
-
- 3.11.3 incident analysis and feedback
3.12 Containment
- 3.12.1 challenges and restrictions
-
- 3.12.2 special alerts
-
- 3.12.3 revocation
-
- 3.12.4 chokepoints
-
- 3.12.5 misinformation and entrapment
3.13 Building Awareness
- 3.13.1 Consumer awareness needs
-
- 3.13.2 Service provider awareness needs
-
- 3.13.3 Education and training programs
-
|