Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
47 views13 pages

08 - Operations Security

The document discusses operations security and outlines several objectives and controls. It discusses 1) having documented operating procedures and change management processes, 2) protecting against malware, 3) regularly backing up data and testing backups, 4) logging and monitoring events and protecting log information, 5) controlling operational software installations, 6) managing technical vulnerabilities, and 7) planning information system audits to minimize disruptions. The document provides guidance for organizations to help ensure correct and secure operations of information processing facilities.

Uploaded by

timmy meng
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views13 pages

08 - Operations Security

The document discusses operations security and outlines several objectives and controls. It discusses 1) having documented operating procedures and change management processes, 2) protecting against malware, 3) regularly backing up data and testing backups, 4) logging and monitoring events and protecting log information, 5) controlling operational software installations, 6) managing technical vulnerabilities, and 7) planning information system audits to minimize disruptions. The document provides guidance for organizations to help ensure correct and secure operations of information processing facilities.

Uploaded by

timmy meng
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Operations security

IZAZI MUBAROK, SST., MSc., MCFE, CHFI, CEH, ACE, OFCE, CISA, CDSS, CCO, CCPA
[email protected]

Telkom University | Teknik Komputer | SMKI © Izazi Mubarok 1


Outline

• Operational procedures and responsibilities


• Protection from malware
• Backup
• Logging and monitoring
• Control of operational software
• Technical vulnerability management
• Information systems audit considerations

Telkom University | Teknik Komputer | SMKI © Izazi Mubarok 2


Operational procedures and responsibilities
Objective: To ensure correct and secure operations of information
processing facilities

Documented operating
procedures Change management
Control Control
• Operating procedures should be • Changes to the organization, business
documented and made available to all processes, information processing
users who need them. facilities and systems that affect
information security should be controlled.

Telkom University | Teknik Komputer | SMKI © Izazi Mubarok 3


Operational procedures and responsibilities
Objective: To ensure correct and secure operations of information
processing facilities

Separation of development, testing


Capacity management and operational environments
Control Control
• The use of resources should be • Development, testing, and operational
monitored, tuned and projections made of environments should be separated to
future capacity requirements to ensure reduce the risks of unauthorized access or
the required system performance. changes to the operational environment.

Telkom University | Teknik Komputer | SMKI © Izazi Mubarok 4


Protection from malware
Objective: To ensure that information and information processing
facilities are protected against malware

Controls against malware


Control
• Detection, prevention and recovery
controls to protect against malware
should be implemented, combined with
appropriate user awareness..

Telkom University | Teknik Komputer | SMKI © Izazi Mubarok 5


Backup
Objective: To protect against loss of data.

Information backup
Control
• Backup copies of information, software
and system images should be taken and
tested regularly in accordance with an
agreed backup policy.

Telkom University | Teknik Komputer | SMKI © Izazi Mubarok 6


Logging and monitoring
Objective: To record events and generate evidence.

Event logging Protection of log information


Control Control
• Event logs recording user activities, • Logging facilities and log information
exceptions, faults and information security should be protected against tampering
events should be produced, kept and and unauthorized access.
regularly reviewed.

Telkom University | Teknik Komputer | SMKI © Izazi Mubarok 7


Logging and monitoring
Objective: To record events and generate evidence.

Administrator and operator logs Clock synchronisation


Control Control
• System administrator and system • The clocks of all relevant information
operator activities should be logged and processing systems within an organization
the logs protected and regularly reviewed. or security domain should be
synchronised to a single reference time
source.

Telkom University | Teknik Komputer | SMKI © Izazi Mubarok 8


Control of operational software
Objective: To ensure the integrity of operational systems

Installation of software on
operational systems
Control
• Procedures should be implemented to
control the installation of software on
operational systems.

Telkom University | Teknik Komputer | SMKI © Izazi Mubarok 9


Technical vulnerability management
Objective: To prevent exploitation of technical vulnerabilities

Management of technical Restrictions on software


vulnerabilities installation
Control Control
• Information about technical vulnerabilities • Rules governing the installation of
of information systems being used should software by users should be established
be obtained in a timely fashion, the and implemented.
organization’s exposure to such
vulnerabilities evaluated and appropriate
measures taken to address the
associated risk.

Telkom University | Teknik Komputer | SMKI © Izazi Mubarok 10


Information systems audit considerations
Objective: To ensure that information and information processing
facilities are protected against malware

Information systems audit


controls
Control
• Audit requirements and activities involving
verification of operational systems should
be carefully planned and agreed to
minimize disruptions to business
processes.

Telkom University | Teknik Komputer | SMKI © Izazi Mubarok 11


Implementation guidance?

Telkom University | Teknik Komputer | SMKI © Izazi Mubarok 12


Terima kasih

Telkom University | Teknik Komputer | SMKI © Izazi Mubarok 13

You might also like