Update on Inspectors General Information Technology Security Working Group I. Organization

Update on Inspectors General
Information Technology Security
Working Group
I.
Organization
II. CSIRT Procedures
III. Fusion Center – Protocols
IV. IT Security Issues
Phishing
•
Phishing is the act of attempting to acquire information such as
usernames, passwords, and credit card details (and sometimes,
indirectly, money) by masquerading as a trustworthy entity in an
electronic communication.
•
Communications purporting to be from popular social web sites, auction sites, banks,
online payment processors or IT administrators are commonly used to lure
unsuspecting public.
•
Phishing emails may contain links to websites that are infected with malware.
•
Phishing is typically carried out by email spoofing or instant messaging, and it often
directs users to enter details at a fake website whose look and feel are almost
identical to the legitimate one.
South Carolina Dept. of Revenue
• August/September 2012
– DOR employee opens a phishing e-mail with
attachment containing malware
– Hacker obtains employee credentials and spends
several weeks patiently and methodically scouring
the system from a remote location gaining
additional credentials and eventually downloading
74.7 gigabytes of data to the Internet
October 10, 2012 was a bad day
• Federal Secret Service notified the state of the
suspected breach
• The breach was undetected by the agency
• For the next 15 days there was a quiet pursuit
of the case by state and federal investigators
October 26, 2012 was worse
• Governor Nikki Haley held a press
conference to tell the public
https://www.youtube.com/watch?v=Lv4cCoUJG8E
South Carolina DOR Issues
Data not encrypted
No multi-password system
Laptops and desktops not encrypted
No use of free state network monitoring
system
• Division of Information Technology
recommended security procedures but state
agencies were not required to follow the
procedures
•
•
•
•
Fixing the problems
• Credit monitoring - $12 million in 1st year
• Password system - $12,000
• 4 months later:
– “state response to hacking is incomplete and
uncertain”
– IG report “statewide cybersecurity is inadequate”
South Carolina – Good News
• December 18, 2013 – and employee from the
Department of Employment and Workforce
downloaded information on 4,658 current and
former employees to a personal device
• December 19, 2013 – law enforcement
notified the agency that security software had
detected the violation
The IT Security Working Group
Organization
•
Co-Chair Mike Blackburn, IG Dept. of Education
•
Co-Chair Al Dennis, IG Dept. of Law Enforcement
•
Co-Chair Walter Sachs, IG Dept. of Management Services
•
Melinda Miguel, Chief Inspector General
•
Kim Mills, CIG Director of Audit (now Marvin Doyal)
•
Rodney MacKinnon, IG Office of Early Learning
•
Sharon Doredant, IG Dept. of Revenue
•
David Merck, IT Auditor Dept. of Children and Families
CSIRT Procedures
Fusion Center Protocols
IT Security Issues
The IT Security Working Group
(expanded)
Organization
CSIRT Procedures
Fusion Center Protocols
IT Security Issues
•
Mike Blackburn, IG (DOE)
•
Julie Leftheris, IG (DHSMV)
•
Al Dennis, IG (FDLE)
•
Margaret Foltz, ISM (SSRC)
•
Walter Sachs, IG (DMS)
•
Bonny Allen, ISM (NSRC)
•
Melinda Miguel, CIG
•
Joe Maleszewski, IG (BOG)
•
Marvin Doyal, CIG, Audit Dir.
•
Mike Phillips, Fusion Center (FDLE)
•
Rodney MacKinnon, IG (OEL)
•
Mark Perez, Fusion Center (FDLE)
•
Sharon Doredant, IG (DOR)
•
Jason Allison (EOG)
•
David Merck, IT Auditor (DCF)
•
Kevin Smith, IT (DEM)
The IT Security Working Group
(Scope and Activities)
Organization
•
•
CSIRT Procedures
Fusion Center Protocols
IT Security Issues
•
•
•
•
•
•
•
IG IT Security Working Group established in June 2013 to evaluate
issues crossing agencies
Appointed informally by the CIG to include: DMS IG (co-chair),
DOE IG (co-chair), FDLE IG (co-chair), DOR IG, HSMV IG, Chief
Inspector General, CIG Director of Audit
Evaluating the existence and potential standardization of CSIRT
Protocols in the agencies
Briefing from Fusion Center (w/ CIOs and ISMs) and toured the
Fusion Center in June 2013
Holding Periodic Meetings
CIG facilitated the appointment of the MS-ISAC designee
CIG oversaw the movement of inventory housed with what was
formally AEIT to FDLE/EOG
Evaluating the need for Data Sharing Agreements
Evaluating the need for Secret Security Clearance to receive
classified reports from FDLE
Computer Security Incident Response Team
Procedures
Organization
CSIRT
Procedures
Fusion Center Protocols
IT Security Issues
71A-1.014 Incident Response.
(1) Each agency shall establish a Computer Security Incident Response Team (CSIRT) to respond to
suspected computer security incidents by identifying and controlling the incidents, notifying designated
CSIRT responders, and reporting findings to agency management.
(2) The CSIRT membership shall include at a minimum the Information Security Manager, the Chief
Information Officer, and a member from the Inspector General’s Office.
(3) The CSIRT shall develop, document, and implement the agency computer security incident reporting
process.
(4) The CSIRT shall develop, document, and implement the agency computer security incident response
process.
(5) The agency computer security incident response process will include notification procedures to be
followed for incidents where investigation determines non-encrypted personal information was, or is
reasonably believed to have been, accessed by an unauthorized person, as required by Section
817.5681, F.S.
(6) The CSIRT under the direction of the Chief Information Officer or Information Security Manager shall
determine the appropriate response required for each suspected computer security incident.
(7) The agency shall notify the Office of Information Security of computer security incidents including
suspected or confirmed breaches within 24 hours of discovery.
(8) Each suspected computer security incident, including findings and corrective actions, shall be
documented and maintained as specified in the agency computer security incident procedures.
(9) The CSIRT shall convene at least once a quarter.
(10) The CSIRT shall provide regular reports to the agency Chief Information Officer.
(11) Suspected computer security incidents shall be reported according to agency reporting procedures.
(12) Agency workers shall report loss of mobile devices immediately according to agency reporting
procedures.
(13) Agency workers shall immediately report lost security tokens, smart cards, identification badges, or
other devices used for identification and authentication purposes according to agency reporting
procedures.
Computer Security Incident Response Team
Procedures
Organization
CSIRT
Procedures
Fusion Center Protocols
IT Security Issues
• Agencies used Carnegie-Mellon
templates from 2003 training
• Issues:
– IG not a core team member
– ISM has a duel role as the CIO or
reports to the CIO
– Categorization and escalation
protocols are similar, but not uniform
FDLE Fusion Center - Protocols
Organization
CSIRT Procedures
Fusion Center Protocols
IT Security Issues
October Meeting with
Information Security Managers
 FDLE Fusion Center
Update
 Agency Intelligence
Liaison Officers
 IG IT Working Group
Update
 House/Senate
Committee
Meetings
 Incident Reporting
 Administrative
Breach Protocols
 CSIRT Policy Review
 Information Security
Plans
 Information Sharing
(Obstacles and
Opportunities)
 Security Clearances
 MOU
FDLE Fusion Center - Protocols
Organization
CSIRT Procedures
Fusion Center Protocols
IT Security Issues
Class 1 Incident: Informational Incident
This level of incident has a low impact to the agency’s or data center’s information technology
resources and is contained within the agency or data center. The following criteria define Class 1
incidents:
1. Data classification: Unauthorized disclosure of information has not occurred.
2. Legal issues: Lost or stolen hardware that has low monetary value and may be considered
standard business equipment.
3. Business impact: Incident does not involve any mission services.
4. Expanse of service disruption: Incident is localized.
5. Threat potential: There is no threat to other information technology resources.
6. Public interest: Slight potential for public interest.
7. Policy infraction: Security policy violations determined by the agency.
Class 2 Incident: Warning Incident
This level of incident has impacted the agency’s or data center’s information technology
resources and is contained within the agency or data center. The following criteria define Class 2
incidents:
1. Data classification: Unauthorized disclosure of information has not been determined.
2. Legal issues: Lost or stolen hardware with low monetary value and is part of mission critical
systems.
3. Business impact: Incident involves mission services.
4. Expanse of service disruption: Incident affects several business units within the agency.
5. Threat potential: Threat to other information technology resources is possible.
6. Public interest: There is the potential for public interest.
7. Policy infraction: Security policy violations determined by the agency.
FDLE Fusion Center - Protocols
Organization
CSIRT Procedures
Fusion Center Protocols
IT Security Issues
Class 3 Incident: Critical Incident
This level of incident has impacted the agency critical mission and has the potential to result in
high public interest. The following criteria define Class 3 incidents:
1. Data classification: Unauthorized disclosure of information has occurred.
2. Legal issues: Lost or stolen hardware with high monetary value.
3. Business impact: Incident involves mission critical services.
4. Expanse of service disruption: Disruption is wide spread across the agency.
5. Threat potential: Incident has spread to other systems within the agency.
6. Public interest: There is likely public interest in the incident.
7. Policy infraction: Security policy violations determined by the agency.
Class 4 Incident: Emergency Incident
This level of incident has impacted or has the potential to impact other state information
technology resources or become events of public interest. The following criteria define Class 4
incidents:
1. Data classification: Unauthorized disclosure of confidential information has occurred.
2. Legal issues: Lost or stolen hardware with high monetary value and is part of mission critical
systems; incident investigation transferred to law enforcement.
3. Business impact: Threat to other agency information technology resources is high.
4. Expanse of service disruption: Disruption has spread to other agencies.
5. Threat potential: Incident has spread to third-party information technology resources.
6. Public interest: There is high public interest in the incident.
7. Policy infraction: Security policy violations determined by the agency.
A few minutes with Senator Ring
http://www.flsenate.gov/media/videoplayer?EventID=2443
575804_2014021049
IT Security Issues
•
Organization
•
CSIRT Procedures
•
Fusion Center Protocols
•
IT Security
Issues
•
•
•
•
Focus on broader policy which will allow the rule(s) to focus
more on specifics.
Continue requiring agency “strategic” and “operational” IT
Security Plans. Strategic plans should cover 3-year period.
Continue “bottom up” approach with Statewide Strategic Plan;
ensure sufficient guidance (and possibly templates) are provided
to assist agencies in the completion of their strategic plans.
Clearly define/describe difference between: (a) risk analysis, (b)
gap analysis, and (c) internal audits.
Define “event” and/or “incident”, require all events/incidents to
be reported to FDLE and AEIT/potential successor agency, and
define time frame for reporting such events/incidents.
Agency ISM should conduct internal agency audit; peer review of
audit performed by other agency ISMs.
Requirement to include appropriate security specs in
solicitations/contracts.
Retain IT security rules.
Organization
CSIRT Procedures
Questions/Comments?
Fusion Center Protocols
IT Security Issues
Walter Sachs
Inspector General
Department of Management Services
(850) 413-8740
[email protected]