You are on page 1of 14

Managing Cyber Security

Ashutosh Bahuguna
Scientist C

Indian Computer Emergency Response Team(CERT-In)


Department of Electronics & Information Technology (DeitY)
Ministry of Communications and Information Technology
bahuguna.a@meity.gov.in
Topics of Discussion

Information Security Management System


(ISMS)

Cyber Security Framework

Cyber Security Capability Maturity Model

TOP 20 Critical Security Controls

Cyber Security Must haves

2
Information
Information?

Information Security? CIA

Information Security Management System

ISO/IEC 27001:2013
Implementing Information Security
1. Scope
2. Context of the Organization
3. Leadership
4. Planning RA & RTP , SoA
5. Support
6. Operations Control Implementation
7. Performance Evaluation
8. Improvement
Cyber Security Framework
NIST Cybersecurity Framework is a risk-
based approach to managing cybersecurity
risk, and is composed of three parts:

Framework Core
Framework Implementation Tiers
Framework Profiles
Framework Core

The Framework Core is a set of cybersecurity


activities, desired outcomes, and applicable
references that are common across critical
infrastructure sectors

Five Components
Identify
Protect
Detect
Respond
Recover
Framework Core
Cyber Security Capability Maturity Model

The C2M2 model is designed to be used by


any organization to enhance its own
cybersecurity capabilities

Maturity Model
o Define its current state
o Determine its future, more mature state
o Identify the capabilities it must attain to reach
that future state
Maturity Indicator Levels: The model defines four
maturity indicator levels, MIL0 through MIL3

10 domains
Risk Management
Asset, Change, and Configuration Management
Identity and Access Management
Threat and Vulnerability Management
Situational Awareness
Information Sharing and Communications
Event and Incident Response, Continuity of Operations
Supply Chain and External Dependencies
Management
Workforce Management
Cybersecurity Program Management
Critical Security Controls

For effective Cyber Defense Critical Security Controls

Recommended set of actions for cyber defense that


provide specific and actionable ways to stop today's most
pervasive and dangerous attacks

Prioritize and focus a smaller number of actions with high


pay-off results

The Controls are effective because they are derived from


the most common attack patterns highlighted in the
leading threat reports and vetted across a very broad
community of government and industry practitioners
CSC 1: Inventory of Authorized and Unauthorized Devices
CSC 2: Inventory of Authorized and Unauthorized Software
CSC 3: Secure Configurations for Hardware and Software on
Mobile Devices, Laptops, Workstations, and Servers
CSC 4: Continuous Vulnerability Assessment and
Remediation
CSC 5: Controlled Use of Administrative Privileges
CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs
CSC 7: Email and Web Browser Protections
CSC 8: Malware Defenses
CSC 9: Limitation and Control of Network Ports, Protocols,
and Services
CSC 10: Data Recovery Capability
CSC 11: Secure Configurations for Network Devices
such as Firewalls, Routers, and Switches
CSC 12: Boundary Defense
CSC 13: Data Protection
CSC 14: Controlled Access Based on the Need to Know
CSC 15: Wireless Access Control
CSC 16: Account Monitoring and Control
CSC 17: Security Skills Assessment and Appropriate
Training to Fill Gaps
CSC 18: Application Software Security
CSC 19: Incident Response and Management
CSC 20: Penetration Tests and Red Team Exercises
!Cyber Security Must-Haves!
-5 Controls
1. Inventory
2. Secure Configurations
3. Continuous Vulnerability Assessment and
Remediation
4. Controlled Use of Administrative Privileges
5. Anti-Malware Solution
Thank You!

Stay Safe! !

You might also like