Security vs. Compliance (Serving two Masters)
Security vs. Compliance |
Why VS? |
•Compliance and Security should compliment and aid each other in fulfilling the corporate security goal |
•Many times this is not the case |
•Sometimes there are misinterpretations of compliance requirement satisfaction and true security |
•Compliance often thought of as = security rather than augmenting and helping the total security posture |
•Compliance often is driver and reason for “knee jerk” reactions in applying security technologies |
–Sometimes not fully assessed for impact, risk need, etc. |
Key Points |
•Security and Compliance often overlap BUT |
–Sometimes organizational security requirements are unrelated to compliance |
•(Example: Perform “red team” vulnerability analysis) |
–Sometimes compliance requirements unrelated to Security |
•(Example: Lockdown Internet Explorer (but the environment doesn’t even allow Internet access) |
•Security is the necessary foundation for compliance and not the other way around! |
•Security focuses on the protection of the organization |
•Compliance often focuses on the protection of the individual or entity |
–Sarbanes-Oxley compliance only requires assessment of databases involved in financial reporting (what about the other DB’s?) |
–How many other threat vectors can lead to the compromise of the same or similar data? |
Key Points |
•Company can fall into trap to thinking that is ALL they have to secure or start trying to figure out how best to only meet the regulatory compliance goals. |
•Other security aspects can get pushed aside, forgotten, or purposefully not addressed in order to leverage resources for regulatory compliance issues. |
–Budgets then allocate in response to compliance issues instead of proactively looking at security initiatives ahead of time. |
•Organization can fall into trap of “checkbox” compliance |
–Enterprises don’t lend much thought to appropriate policies or required systems, nor to what they are going to do with the inevitable streams of data coming from their new security products bought to satisfy some compliance control. |
Compliance |
•Compliance refers to |
–Establishment of corporate policies to meet regulatory requirements |
–Validation that corporate systems and procedures comply now (or have complied in a specific period of time) with regulations |
•US regulations include: |
–Sarbanes-Oxley |
–California SB 1386 |
–21 CFR Part 11 |
•Compliance policy for automated information systems (AIS) derived from corporate compliance policy |
Compliance |
•Compliance = Regulations |
–FISMA, HIPPA, Sarbanes-Oxley |
–And the tide keeps rising |
•The rationale behind the regulations is to increase transparency and/or improve efficiency |
Overview of Regulations |
Various regulations mandate the protection of information including industry-specific and geography-specific. Outlined below are several regulations and their security requirements: |
Security |
Increasing need for organizations to know who is doing what when with what information, and then to authorize only certain people to do certain things at certain times |
Compliance only = False sense of security sometimes |
Hannaford Bros Grocery Chain |
4.2 Million credit card numbers exposed |
Had recently been PCI certified |
Certified in February of 2008 |
Attack commenced on Dec. 7 but wasn’t contained until March 10th. |
Security and Compliance |
•compliance policies typically addresses |
–Conditions under which authorized users can access functions or data |
–Maintaining records of user access to functions/data |
–Preventing modification or disclosure of data (unintended or deliberate) |
•Security mechanisms |
–Can implement policies which support compliance |
–Provide evidence of compliance |
•Security does not guarantee compliance and compliance does not guarantee security!!!! |
Fundamentals of Technology to Support Security and Compliance |
•Collection/consolidation of content (in a content management system) |
•Authentication |
•Encryption and Rights Management (in place, in transit, in use) |
•Non-Repudiable Audit Trail of access and routing |
Fundamentals of Planning for Security and Compliance |
•Business Process Modeling |
•Understand regulatory requirements |
•Establish a process for compliance review |
•E-discovery |
Where To Spend |
•First try to recognize differences the discrete differences between security and compliance |
–Allocate resources, effort, and money to where it mutually benefits both areas as much as possible. |
•Use compliance regulations as an impetus to improve security |
–Many compliance regulations address more procedural and process-oriented activities –usually reactive and not proactive |
–Organizations SHOULD be installing security mechanisms that aid in BOTH the actual security and the procedural and process-oriented compliance requirements. |