Table of Contents
Executive Summary 6
Section 1: Value Proposition Strategic Assessment 7
1.1 Information Security Vision 7
1.2 Information Security Mission 7
1.3 Drivers, Goals, and Benefits of Security Governance and Management 7
1.3 Table 1 8
Section 2: Roles and Responsibility 9
2.1 Table 2 9
Section 3: Liabilities 10
3.1 Safety of employees and customers 10
3.2 Private Information 10
3.3 Client Personal Belongings and Money 10
Section 4: Physical Security 11
4.1 Biometrics 11
4.2 Convergence 11
4.3 Risk Assessment 11
Section 5: Cyber Security 12
5.1 Internet of Things 12
5.2 Multiple Vendors 12
Section 6: 7 Layers of a Mature Security Program 13
6.1 Table 3 13
7.1 Metrics 14
7.2 Measurements 14
Section 8: Security Appliance 15
8.1 Security Appliance 15
8.2 Firewall 15
8.3 Vulnerability Assessment 15
Section 9: Antivirus 16
9.1 Antivirus 16
9.1 Table 4 16
Section 10: Log Management 17
10.1 Log Management 17
10.2 Phases of Log Management (Sumologic, 2018). 17
10.2 Table 5 17
Section 11: Patch Management 19
11.1 Patch Management 19
Section 12: Security Awareness Training 20
12.1 Security Awareness Training 20
12.2 Provided by the Organization 20
12.3 Security Awareness Activity 20
Section 13: Policies and Procedures 21
13.1 Policies and Procedures 21
13.2 PCI DSS 21
Section 14: Strategy 22
14.1 Strategy 22
14.2 Breach Plan 22
14.3 Termination of Employee Process 22
14.4 Business Continuity 22
Section 15: Risk Assessment 23
15.1 Risk Assessment 23
15.2 Threat Hunters 23
15.3 Risk Management Framework 23
15.3 Table 3 23
Section 16: Protocol 24
16.1 Social Media 24
16.2 Robbery Safety 24
Section 17: Critical Security Controls (SANS) 25
17.1 Inventory of Authorized and Unauthorized Devices 25
17.2 Controlled Use of Administrative Privileges 25
17.3 Email and Web Brower Protections 25
17.4 Data Protection 25
Section 18: Auditing 26
18.1 How often? 26
18.2 Internal Audits 26
18.3 External Audits 26
References 27
Executive Summary
Bank of Abiaad is a bank located in the state of Michigan. It has a total of 80 employees within the two bank branches as well as 30 head office employees which is located Downtown, Michigan. The purpose of the governance and management plan is to allow assurance there will be an alignment with the business and security aspect. This document allows for the clarification of the goals, protocols, and procedures of the business. This document provides information in so that all employees and stakeholders have an understanding of requirements, assurance, process, and implementations.
Section 1: Value Proposition Strategic Assessment
1.1 Information Security Vision
Bank of Abiaad is devoted to providing the confidentiality and integrity in order to create the availability of a safe
1.2 Information Security Mission
The mission of Information Security is to create, implement, and uphold an information security program that shields the Hospital’s systems, services, and data against unauthorized use, disclosure, modification, damage, and loss.
1.3 Drivers, Goals, and Benefits of Security Governance and Management
o Support business initiatives
o Safety from the potential for civil or legal liability which is a result of information inaccuracy, improper disclosure, or the absence of due care in its protection.
o Accountability for protecting information during critical business activities.
Business Strategic Goal
Information Security Objectives
Risk mitigation and asset protection
o Meet the operating needs of the organization in a secure manner
Operational and cost efficiency
Compliance obligation
1.3 Table 1
Section 2: Roles and Responsibility
Duty
Owner
Others Involved
Ensuring proper protection for all physical and technical aspects of the organization (SANS)
CISO
CEO
Leading the development and execution of the long term strategy (Petrotal, 2017)
CEO
Shareholders
In charge of all background responsibility including technical support
Head Office
CEO, CISO
Ensure all locations of bank are up to standards
District Manager
CEO
Ensure all employees are completing job correctly
Manager
District Manager, CEO, CISO
Provide assistance to clients and information on savings and investments. (Writer, 2017)
Banker
District Manager, CEO, CISO
2.1 Table 2
Section 3: Liabilities
3.1 Safety of employees and customers
3.2 Private Information
3.3 Client Personal Belongings and Money
Section 4: Physical Security
4.1 Biometrics
4.2 Convergence
4.3 Risk Assessment
Section 5: Cyber Security
5.1 Internet of Things
5.2 Multiple Vendors
Section 6: 7 Layers of a Mature Security Program
6.1 Table 3
7.1 Metrics
7.2 Measurements
o Critical in case of ransomware
Section 8: Security Appliance
8.1 Security Appliance
8.2 Firewall
8.3 Vulnerability Assessment
Section 9: Antivirus
9.1 Antivirus
9.1 Table 4
Section 10: Log Management
10.1 Log Management
10.2 Phases of Log Management (Sumologic, 2018).
10.2 Table 5
Section 11: Patch Management
11.1 Patch Management
Section 12: Security Awareness Training
12.1 Security Awareness Training
12.2 Provided by the Organization
12.3 Security Awareness Activity
Section 13: Policies and Procedures
13.1 Policies and Procedures
13.2 PCI DSS
o Three steps for adhering to PCI DSS (PCI, 2010).
♣ Assess – identify cardholder data, inventory, and analyzation of IT assets and business processes for card payment processing in order to find vulnerabilities that could render cardholder data.
♣ Remediate – repair vulnerabilities and only keeping cardholder data needed.
♣ Report – accumulating and submitting required remediation records and presenting compliance reports to the bank and card brands business is done with.
Section 14: Strategy
14.1 Strategy
14.2 Breach Plan
14.3 Termination of Employee Process
o Ensures that former employee will not have the ability to cause a breach or loss of information as a way of retaliation.
14.4 Business Continuity
Section 15: Risk Assessment
15.1 Risk Assessment
o Data breach, fire, robbery, shooting, and any possible natural disasters
o IT Support (Head Office)
o CEO
o CISO
o District Manager
o CEO and CISO are to inform district manager what is the acceptance rate.
15.2 Threat Hunters
15.3 Risk Management Framework
15.3 Table 3
Section 16: Protocol
16.1 Social Media
16.2 Robbery Safety
Section 17: Critical Security Controls (SANS)
17.1 Inventory of Authorized and Unauthorized Devices
17.2 Controlled Use of Administrative Privileges
17.3 Email and Web Brower Protections
17.4 Data Protection
Section 18: Auditing
18.1 How often?
18.2 Internal Audits
18.3 External Audits
References
Brotby, K. (2006). Information security governance: A practical development and implementation approach. Hoboken, New Jersey: John Wiley & Sons, Inc.
Cisco, What Is a Firewall? (2018, June). Retrieved from https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html
DRI What is Business Continuity Management? (2018). Retrieved from https://drii.org/what-is-business-continuity-management
Field, T. (2008, February). Focus on Physical Security. Retrieved from https://www.bankinfosecurity.com/focus-on-physical-security-a-706
HHS Office of the Secretary, Office for Civil Rights, & OCR. (2013, July 26). Summary of the HIPAA Security Rule. Retrieved from https://www.hhs.gov/hipaa/for-professionals/security/laws-regulations/index.html
Official PCI Security Standards Council Site – Verify PCI Compliance, Download Data Security and Credit Card Security Standards. (2010, October). Retrieved from https://www.pcisecuritystandards.org/
Role and Responsibilities Chief Executive Offier – (2017). Retrieved from http://www.petrotal-corp.com/docs/RolesAndRespCEO.pdf
SANS Critical Security Control. (n.d.). Retrieved from https://www.sans.org/media/critical-security-controls/critical-controls-poster-2016.pdf
SANS Vulnerability Assessments (n.d.) Retrieved from https://www.sans.org/reading-room/whitepapers/threats/vulnerability-assessments-pro-active-steps-secure-organization-453
Sumologic. (2018, May). What is Log Management? Retrieved from https://www.sumologic.com/what-is-log-management/
Thrive, Importance of Patch Management. (2018, January 16). Retrieved from https://www.thrivenetworks.com/blog/patch-management
Writer, J. M. (2017, June 22). The many roles and responsibilities of a Banker. Retrieved from http://www.jobmail.co.za/blog/the-many-roles-and-responsibilities-of-a-banker/
Yurcan, B. (2017, August 01). Bank cybersecurity may need a new mindset. Retrieved from https://www.americanbanker.com/news/bank-cybersecurity-may-need-a-new-mindset