Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
M
S
O
The 33 IT security principles are grouped into the following 6 categories:
The policy identifies security goals (e.g., confidentiality, integrity, availability, accountability, and assurance).
The policy also should require definition of critical assets, the perceived threat, and security-related roles and responsibilities.
Experience has shown it to be both difficult and costly to implement security measures properly and successfully after a system has been developed, so it should be integrated fully into the system life-cycle process.
Information technology exists in physical and logical locations, and boundaries exist between these locations.
An understanding of what is to be protected from external factors can help ensure adequate protective measures are applied where they will be most effective.
It is unwise to assume that developers know how to develop secure software. Therefore, ensure that developers are adequately trained in the development of secure software
before developing the system.
Risk is combination of
Elimination of all risk is not cost-effective.
An external domain is one that is not under your control. External systems should be
considered insecure. Until an external domain has been deemed “trusted,” system engineers,
architects, and IT specialists should presume the security measures of an external system are
different than those of a trusted internal system and design the system security features
accordingly.
To meet stated security requirements, a systems designer, architect, or security
practitioner will need to identify and address all competing operational needs.
Because IT security needs are not uniform, system designers and security practitioners should consider the level of trust when connecting to other external networks and internal sub-domains
IT specialists should implement security measures to preserve, as needed, the integrity, confidentiality, and availability of data, including application software, while the information is being processed, in transit, and in storage.
Designers should recognize that in some instances it will not be possible to meet
security goals with systems constructed entirely from COTS products. In such instances, it will
be necessary to augment COTS with non-COTS mechanisms.
Examples of “attack” classes are: Passive monitoring, active network attacks, exploitation by insiders, attacks requiring physical access or proximity, and the insertion of backdoors and malicious code during software development and/or distribution.
Most organizations depend significantly on distributed information systems to
perform their mission or business. These systems distribute information both across their own organization and to other organizations.
When a “common” evaluation process is based upon common requirements or
criteria, a level of confidence can be established that ensures product security functions conform to an organization’s security requirements.
Each security mechanism should be able to support migration to new technology or upgrade of new features without requiring an entire system redesign. The security design should be modular so that individual parts of the security design can be upgraded without the requirement to modify the entire system.
The more difficult it is to maintain and operate a security control, the less effective that control is likely to be. Therefore, security controls should be designed to be consistent with the concept of operations and with ease-of-use as an important consideration.
Security designs should consider a layered approach to address or protect against a specific threat or to reduce vulnerability. For example, the use of a packet-filtering router in conjunction with an application gateway and an intrusion detection system combine to increase the work-factor an attacker must expend to successfully attack the system.
Information systems should be resistant to attack, should limit damage, and should recover rapidly when attacks do occur.
Assurance is the grounds for confidence that a system meets its security
expectations. These expectations can typically be summarized as providing sufficient resistance to both direct penetration and attempts to circumvent security controls.
Design systems to limit or contain vulnerabilities. If a vulnerability does exist,
damage can be limited or contained, allowing other information system elements to function properly.
Physical isolation may include ensuring that no physical connection exists between an organization’s public access information resources and an organization’s critical information.
To control the flow of information and access across network boundaries in
computing and communications infrastructures, and to enforce the proper separation of user groups, a suite of access control devices and accompanying access control policies should be used.
Organizations should monitor, record, and periodically review audit logs to identify unauthorized use and to ensure system resources are functioning properly.
Continuity of operations plans or disaster recovery procedures address continuance of an organization’s operation in the event of a disaster or prolonged service interruption that affects the organization’s mission
The more complex the mechanism, the more likely it may possess exploitable flaws. Simple mechanisms tend to have fewer exploitable flaws and require less maintenance.
Security measures include people, operations, and technology. Where technology is used, hardware, firmware, and software should be designed and implemented so that a minimum number of system elements need to be trusted in order to maintain protection.
Its goal is to reduce risk by limiting the number of people with access to critical system security controls; i.e., controlling who is allowed to enable or disable system security features or change the privileges of users or programs. Best practice suggests it is better to have several administrators with limited access to security resources rather than one person with "super user" permissions. .
Extra measures should not be implemented if they do not support a recognized service or security goal. Such mechanisms could add unneeded complexity to the system and are potential sources of additional vulnerabilities.
At the end of a system’s life-cycle, system designers should develop procedures to dispose of an information system’s assets in a proper and secure fashion. Procedures must be implemented to ensure system hard drives, volatile memory, and other media are purged to an acceptable level and do not retain residual information.
Many errors reoccur with disturbing regularity - errors such as buffer overflows, race conditions, format string errors, failing to check input for validity, and programs being given excessive privileges. Learning from the past will improve future results.
It is important to associate all elements with the security service they provide. These components are likely to be shared across systems to achieve security as infrastructure resources come under more senior budget and operational control.
An efficient and cost effective security capability should be able to enforce multiple security policies to protect multiple information domains without the need to separate physically the information and respective information systems processing the data.
It is essential that adequate authentication be achieved in order to implement
security policies and achieve security goals.
An identity may represent an actual user or a process with its own identity, e.g., a program making a remote access. Unique identities are a required element in order to be able to:
• Maintain accountability and traceability of a user or process
• Assign specific rights to an individual user or process
• Provide for non-repudiation
• Enforce access control decisions
• Establish the identity of a peer in a secure communications path
• Prevent unauthorized users from masquerading as an authorized user.
?