SlideShare a Scribd company logo
TransformingLives. InventingtheFuture. www.iit.edu
I ELLINOIS T UINS TI T
OF TECHNOLOGY
ITM 578 1
Implementing Security
Ray Trygstad
ITM 478/578
Spring 2004
Information Technology & Management Degree Programs
CenterforProfessional Development
Slides based on Whitman, M. and Mattord, H., Principles of InformationSecurity; Thomson Course Technology 2003
ITM 578 2
ILLINOIS INSTITUTE OF TECHNOLOGY
Learning Objectives
Upon completion of this lesson the
student should be able to:
– Describe how the organization’s security
blueprint becomes a project plan
– Discuss the numerous organizational
considerations that must be addressed by
the project plan
– Discribe the significant role and
importance of the project manager in the
success of an information security project
ITM 578 3
ILLINOIS INSTITUTE OF TECHNOLOGY
Learning Objectives
Upon completion of this lesson the
student should be able to:
– Discuss the need for professional project
management for complex projects
– Describe technical strategies and models
for implementing the project plan
– Recognize nontechnical problems that
organizations face in times of rapid
change
ITM 578 4
ILLINOIS INSTITUTE OF TECHNOLOGY
ITM 578 5
ILLINOIS INSTITUTE OF TECHNOLOGY
Introduction
 In general the implementation phase is
accomplished by changing the configuration
and operation of the organization’s
information systems to make them more
secure.
 It includes changes to:
– Procedures (through policy)
– People (through training)
– Hardware (through firewalls)
– Software (through encryption)
– Data (perhaps through classification)
ITM 578 6
ILLINOIS INSTITUTE OF TECHNOLOGY
Introduction
During the implementation phase,
the organization translates its
blueprint for information security
into a concrete project plan
The project plan delivers instructions
to the individuals who are executing
the implementation
ITM 578 7
ILLINOIS INSTITUTE OF TECHNOLOGY
Introduction
 These instructions focus on the security
control changes needed to the hardware,
software, procedures, data, and people that
make up the organization’s information
systems
 But before a project plan can be developed,
management should have articulated and
coordinated the information security vision
and objectives involved in the execution of
the plan
ITM 578 8
ILLINOIS INSTITUTE OF TECHNOLOGY
Analyze
Physical Design
Implementa tion:
Implementing Security
Chapter 10
Logical Design
Maintain
FIG URE 10-1 Implementation Phase within the SecSDLC
Implementa tion:
Personnel & Security
Chapter 11
Implementation Phase
ITM 578 9
ILLINOIS INSTITUTE OF TECHNOLOGY
Project Management
Once the organization’s vision and
objectives are documented and
understood, the blueprint can be
turned into a project plan
The major steps in executing the
project plan are:
– Planning the project
– Supervising tasks and maintaining
control
– Wrapping up the project plan
ITM 578 10
ILLINOIS INSTITUTE OF TECHNOLOGY
Project Management
The project plan can be developed in
any number of ways
Each organization has to determine
its own project management
methodology for IT and information
security projects
ITM 578 11
ILLINOIS INSTITUTE OF TECHNOLOGY
Project Management
Whenever possible, information
security projects should follow the
organizational practices of project
management.
If your organization does not have
clearly defined project management
practices, the following general
guidelines on project management
practices can be applied
ITM 578 12
ILLINOIS INSTITUTE OF TECHNOLOGY
Developing the Project Plan
 Creation of a detailed project plan using a
simple planning tool, such as the work
breakdown structure (WBS)
– Common task attributes are:
• Work to be accomplished (activities and deliverables)
• Individuals (or skills set) assigned to perform the task
• Start and end dates for the task (when known)
• Amount of effort required for completion in hours or
work days
• Estimated capital expenses for the task
• Estimated non-capital expenses for the task
• Other tasks on which the task depends
– Each major task is then further divided into
either smaller tasks or specific action steps
ITM 578 13
ILLINOIS INSTITUTE OF TECHNOLOGY
Project Planning
 As the project plan is developed, adding
detail to the plan not always straightforward
 Special considerations include:
– financial
– priority
– time
– staff
– scope
– procurement
– organizational feasibility
– training and indoctrination
– change control and technology governance
ITM 578 14
ILLINOIS INSTITUTE OF TECHNOLOGY
Developing the Project Plan
Each major task is then further
divided into either smaller tasks or
specific action steps.
Key components of the project plan
are:
– Identify Work To Be Accomplished.
– Describe the skill set or individual
person needed to accomplish the task.
– Focus on determining only completion
dates for major milestones.
ITM 578 15
ILLINOIS INSTITUTE OF TECHNOLOGY
Developing the Project Plan
– Estimate the expected capital expenses
for the completion of this task, subtask,
or action item.
– Estimate the expected non-capital
expenses for the completion of the task,
subtask, or action item.
– Note wherever possible the
dependencies of other tasks or action
steps on the task or action step at hand.
ITM 578 16
ILLINOIS INSTITUTE OF TECHNOLOGY
Financial
No matter what information security
needs exist in the organization, the
amount of effort that can be expended
depends on the funds available
Cost-benefit analysis must be verified
prior to development of the project plan
ITM 578 17
ILLINOIS INSTITUTE OF TECHNOLOGY
Financial
Both public and private organizations
have budgetary constraints, albeit of a
different nature
To justify an amount budgeted for a
security project at either public or
for-profit organizations, it may be
useful to benchmark expenses of
similar organizations
ITM 578 18
ILLINOIS INSTITUTE OF TECHNOLOGY
Priority
 In general, the most important information
security controls should be scheduled first
 The implementation of controls is guided by
the prioritization of threats and the value of
the information assets threatened
 A control that costs a little more and is a
little lower on the prioritization list but
addresses many more specific vulnerabilities
and threats have higher priority than a less
expensive, higher priority component that
only addresses one particular vulnerability
ITM 578 19
ILLINOIS INSTITUTE OF TECHNOLOGY
Time and Scheduling
 Time is another constraint that has a broad
impact on the development of the project
plan
 Time can impact dozens of points in the
development of a project plan including the
following:
– time to order and receive a security control due to
backlogs of the vendor or manufacturer
– time to install and configure the control
– time to train the users
– time to realize the return on investment of the
control
ITM 578 20
ILLINOIS INSTITUTE OF TECHNOLOGY
Staffing
 The lack of enough qualified, trained, and
available personnel also constrains the
project plan
 Experienced staff is often needed to
implement available technologies and to
develop and implement policies and training
programs
 If no staff members are trained to configure
a firewall that is being purchased, someone
must be trained, or someone must be hired
who is experienced with that particular
technology
ITM 578 21
ILLINOIS INSTITUTE OF TECHNOLOGY
Scope
 It is unrealistic for an organization to install
all information security components at once
 In addition to the constraints of handling so
many complex tasks at one time, there are
the problems of interrelated conflicts
between the installation of information
security controls and the daily operations of
the organization
 The installation of new information security
controls may also conflict with existing
controls
ITM 578 22
ILLINOIS INSTITUTE OF TECHNOLOGY
Procurement
 All IT and information security planners
must consider the acquisition of goods and
services
 There are a number of constraints on the
selection process for equipment and services
in most organizations, specifically in the
selection of certain service vendors or
products from manufacturers and suppliers
 These constraints may change the specifics
of a particular technology or even eliminate
it from the realm of possibilities
ITM 578 23
ILLINOIS INSTITUTE OF TECHNOLOGY
Organizational Feasibility
Policies require time to develop and
new technologies require time to be
installed, configured, and tested
Employees need to understand how a
new program impacts their working
lives
ITM 578 24
ILLINOIS INSTITUTE OF TECHNOLOGY
Organizational Feasibility
The goal of the project plan is to avoid
new security components from directly
impacting the day-to-day operations of
the individual employees
Changes should be transparent to
users, unless the new technology
causes changes to procedures, such as
requiring additional authentication or
verification
ITM 578 25
ILLINOIS INSTITUTE OF TECHNOLOGY
Training and Indoctrination
The size of the organization and the
normal conduct of business may
preclude a single large training
program
As a result, the organization should
conduct a phased in or pilot approach
to implementation, such as “roll-out”
training for one department at a time
ITM 578 26
ILLINOIS INSTITUTE OF TECHNOLOGY
Training and Indoctrination
In the case of policies, it may be
sufficient to brief all supervisors on
new policy and then have the
supervisors update end users in
normal meetings
Ensure that compliance documents
are also distributed, requiring all
employees to read, understand, and
agree to the new policies
ITM 578 27
ILLINOIS INSTITUTE OF TECHNOLOGY
Change Control & Technology Governance
In organizations that have IT
infrastructures of significant size, the
change control and technology
governance issues become essential
ITM 578 28
ILLINOIS INSTITUTE OF TECHNOLOGY
Project Management
Project management requires a unique
set of skills and a thorough
understanding of a broad body of
specialized knowledge
It is a realistic assumption that most
information security projects require a
trained project manager, CISO, or
skilled IT manager versed in project
management techniques to oversee the
project
ITM 578 29
ILLINOIS INSTITUTE OF TECHNOLOGY
Project Management
In addition, when selecting advanced
or integrated technologies or
outsourced services even experienced
project managers are advised to seek
expert assistance when engaging in a
formal bidding process
ITM 578 30
ILLINOIS INSTITUTE OF TECHNOLOGY
Supervising Implementation
Some organizations may designate a
champion from general management to
supervise the implementation of the
project plan
An alternative is to designate a senior
IT manager or the CIO of the
organization to lead the
implementation
ITM 578 31
ILLINOIS INSTITUTE OF TECHNOLOGY
Supervising Implementation
The optimal solution is to designate a
suitable person from the information
security community of interest, since
the inherent focus is on the
information security needs of the
organization
It is up to each organization to find
the leadership for a successful project
implementation
ITM 578 32
ILLINOIS INSTITUTE OF TECHNOLOGY
Executing the Plan
Using negative feedback loop to control
project execution:
– Progress is measured periodically
– Measured results are compared against
expected results
– When significant deviation occurs,
corrective action taken
•When corrective action is required either the
estimate was flawed or performance has lagged
ITM 578 33
ILLINOIS INSTITUTE OF TECHNOLOGY
Executing the Plan
– When an estimate is flawed the plan should be
corrected and downstream tasks updated to reflect
the change
– When performance has lagged add resources,
lengthen the schedule, or reduce the quality or
quantity of the deliverables
•The decisions are usually expressed in terms
of trade-offs
•Often a project manager can adjust one of the
three planning parameters
ITM 578 34
ILLINOIS INSTITUTE OF TECHNOLOGY
Negative Feedback Loop
FIGURE 10-2 Negative Feedback Loop
Plan is developedPlan is developed
WorkWork
Progress is measuredProgress is measured
Corrective actionCorrective action
Complete?Complete?
Project isProject is
completecomplete
On target?On target?
YesYes
YesYes
NoNo
NoNo
ITM 578 35
ILLINOIS INSTITUTE OF TECHNOLOGY
Executing the Plan
When corrective action is required,
there are two basic situations: either
the estimate was flawed or
performance has lagged
When an estimate is flawed, for
example a faulty estimate for effort
hours is discovered, the plan should
be corrected and downstream tasks
updated to reflect the change
ITM 578 36
ILLINOIS INSTITUTE OF TECHNOLOGY
Executing the Plan
When performance has lagged, for
example due to high turnover of
skilled employees, correction is
required by adding resources,
lengthening the schedule, or by
reducing the quality or quantity of
the deliverable
ITM 578 37
ILLINOIS INSTITUTE OF TECHNOLOGY
Technical Topics of Implementation
Some parts of the implementation
process are technical in nature,
dealing with the application of
technology, while others are not,
dealing instead with the human
interface to technical systems
ITM 578 38
ILLINOIS INSTITUTE OF TECHNOLOGY
Executing the Plan
Decisions are usually expressed in
terms of trade-offs
Often a project manager can adjust
one of the three planning parameters
for the task being corrected:
– Effort and money allocated
– Elapsed time or scheduling impact
– Quality or quantity of the deliverable
ITM 578 39
ILLINOIS INSTITUTE OF TECHNOLOGY
Wrap-up
 Project wrap-up is usually handled as a
procedural task assigned to a mid-level IT or
information security manager
 These managers collect documentation,
finalize status reports, and deliver a final
report and a presentation at a wrap-up
meeting
 The goal of the wrap-up is to resolve any
pending issues, critique the overall effort of
the project, and draw conclusions about how
to improve the process for the future
ITM 578 40
ILLINOIS INSTITUTE OF TECHNOLOGY
Conversion Strategies
As the components of the new
security system are planned,
provisions must be made for the
changeover from the previous
method of performing a task to
the new methods
ITM 578 41
ILLINOIS INSTITUTE OF TECHNOLOGY
Conversion Strategies
– Direct changeover: also known as
going “cold turkey,” involves stopping
the old method and beginning the new.
– Phase implementation: the most
common approach, involves rolling out a
piece of the system across the entire
organization.
ITM 578 42
ILLINOIS INSTITUTE OF TECHNOLOGY
Conversion Strategies (continued)
– Pilot implementation: involves
implementing all security improvements
in a single office, department, or
division, and resolving issues within
that group before expanding to the rest
of the organization.
– Parallel operations: involve running
the new methods alongside the old
methods.
ITM 578 43
ILLINOIS INSTITUTE OF TECHNOLOGY
The Bull’s-Eye Model
 By reviewing the information security
blueprint and the current state of the
organization’s information security efforts
in terms of the four layers of the bulls-eye
model, project planners can find guidance
about where to lobby for expanded
information security capabilities
 This approach relies on a process of
evaluating project plans in a progression
through four layers: policy, network,
systems and applications
ITM 578 44
ILLINOIS INSTITUTE OF TECHNOLOGY
The Bull’s-Eye Model
 Use the blueprint and the current state of
information security efforts and the four
layers of the bull’s-eye model, to find
guidance about where to focus - progressing
through policy, networks, systems, and
applications.
– Sound and useable IT and information security
policy comes first
– Network controls are designed and deployed next
– Information, process, and manufacturing
systems of the organization are secured next
– Assessment and remediation of the security of
the organization’s applications is the final step
ITM 578 45
ILLINOIS INSTITUTE OF TECHNOLOGY
The Bull’s-Eye Model
FIGURE 10-3 The Bull’s-Eye Model
PoliciesPolicies
NetworksNetworks
SystemsSystems
ApplicationsApplications
ITM 578 46
ILLINOIS INSTITUTE OF TECHNOLOGY
To Outsource or Not
 Just as some organizations outsource IT
operations, organizations can outsource part
or all of their information security programs
 When an organization has outsourced IT
services, information security should be part
of the contract arrangement with the
outsourcer
 Because of the complex nature of
outsourcing, the best advice is to hire the
best outsourcing specialists, and then have
the best attorney possible negotiate and
verify the legal and technical intricacies of
the outsourcing contract
ITM 578 47
ILLINOIS INSTITUTE OF TECHNOLOGY
Technology Governance & Change Control
Other factors that determine the
success of an organization’s IT and
information security are technology
governance and change control
processes
Technology governance is a complex
process that an organization uses to
manage the impacts and costs caused
by technology implementation,
innovation, and obsolescence
ITM 578 48
ILLINOIS INSTITUTE OF TECHNOLOGY
Technology Governance & Change Control
Technology governance also
facilitates the communication about
technical advances and issues across
the organization
Medium or large organizations deal
with the impact of technical change
on the operation of the organization
through a change control process
ITM 578 49
ILLINOIS INSTITUTE OF TECHNOLOGY
Technology Governance & Change Control
 By managing the process of change:
– Improve communication about change
– Enhance coordination between organizational
groups as change is scheduled and completed
– Reduce unintended consequences by having a
process to resolve potential conflict and
disruption
– Improve quality of service as potential failures
are eliminated and groups work together
– Assure management that all groups are
complying with the organization’s policies
regarding technology governance, procurement,
accounting, and information security
ITM 578 50
ILLINOIS INSTITUTE OF TECHNOLOGY
Nontechnical Topics of Implementation
Other parts of the implementation
process are not technical in nature,
dealing with the human interface to
technical systems
These include the topics of creating a
culture of change management as well
as some considerations for
organizations facing change
ITM 578 51
ILLINOIS INSTITUTE OF TECHNOLOGY
Culture of Change
The prospect of change can cause
employees to unconsciously or
consciously resist
The stress of change can increase the
probability of mistakes or create
vulnerabilities
Resistance to change can be lowered by
building resilience for change
ITM 578 52
ILLINOIS INSTITUTE OF TECHNOLOGY
Culture of Change
One of the oldest models of making
change is the Lewin change model:
– Unfreezing: “thawing out” hard and
fast habits and established procedures.
– Moving: the transition between the old
way and the new.
– Refreezing: the integration of the new
methods into the organizational culture.
ITM 578 53
ILLINOIS INSTITUTE OF TECHNOLOGY
Considerations in Change
In order to make an organization
more amenable to change, some steps
can be taken:
– reducing resistance to change from the
beginning of the planning process
– steps taken to modify the organization
to be more accepting of change
ITM 578 54
ILLINOIS INSTITUTE OF TECHNOLOGY
Reducing Resistance
 The more ingrained the previous methods
and behaviors, the more difficult the change
 The primary mechanism used to overcome
this resistance to change is to improve the
interaction between the affected members of
the organization and the project planners in
the earlier phases of the SecSDLC
 The guideline to improve this interaction is a
three-step process:
– communicate
– educate
– involve
ITM 578 55
ILLINOIS INSTITUTE OF TECHNOLOGY
Developing Support for Change
 The best situation is an organization with a
culture that is beyond low resistance to
change but fosters resilience for change
 This resilience means the organization has
come to expect that change is a necessary
part of organizational culture, and that to
embrace change is more productive than
fighting it
 To develop such a culture the organization
must successfully accomplish many projects
that require change
ITM 578 56
ILLINOIS INSTITUTE OF TECHNOLOGY
The End…
Questions?

More Related Content

What's hot (20)

PPT
Unified Modeling Language
Debajyoti Biswas
 
PPT
Object Oriented Analysis and Design
Haitham El-Ghareeb
 
PPTX
Common language runtime clr
SanSan149
 
PPT
Architecture of .net framework
Then Murugeshwari
 
PPTX
Software Engineering
Mohamed Essam
 
PPT
Use Case Diagram
Kumar
 
PPTX
Graphical User Interface (Gui)
Bilal Amjad
 
PPTX
Objects and classes in Visual Basic
Sangeetha Sg
 
PPT
Uml diagrams
barney92
 
PPTX
Sequence diagram
Rahul Pola
 
PPT
The need for security
Dhani Ahmad
 
PPTX
oops concept in java | object oriented programming in java
CPD INDIA
 
PDF
Agile Methods - course notes
Evan Leybourn
 
PPT
Use case Diagram
Preeti Mishra
 
PPT
Mvc architecture
Surbhi Panhalkar
 
PPT
Visual programming lecture
AqsaHayat3
 
PPTX
Entity Relationship Modelling
Bhandari Nawaraj
 
PPT
constants, variables and datatypes in C
Sahithi Naraparaju
 
PDF
Object-Oriented Programming in Java.pdf
Bharath Choudhary
 
PPT
Use Case Diagram
Ashesh R
 
Unified Modeling Language
Debajyoti Biswas
 
Object Oriented Analysis and Design
Haitham El-Ghareeb
 
Common language runtime clr
SanSan149
 
Architecture of .net framework
Then Murugeshwari
 
Software Engineering
Mohamed Essam
 
Use Case Diagram
Kumar
 
Graphical User Interface (Gui)
Bilal Amjad
 
Objects and classes in Visual Basic
Sangeetha Sg
 
Uml diagrams
barney92
 
Sequence diagram
Rahul Pola
 
The need for security
Dhani Ahmad
 
oops concept in java | object oriented programming in java
CPD INDIA
 
Agile Methods - course notes
Evan Leybourn
 
Use case Diagram
Preeti Mishra
 
Mvc architecture
Surbhi Panhalkar
 
Visual programming lecture
AqsaHayat3
 
Entity Relationship Modelling
Bhandari Nawaraj
 
constants, variables and datatypes in C
Sahithi Naraparaju
 
Object-Oriented Programming in Java.pdf
Bharath Choudhary
 
Use Case Diagram
Ashesh R
 

Viewers also liked (9)

PPT
Chapter19 rapid application development
Dhani Ahmad
 
PPT
Chap01 introduction to project management
Dhani Ahmad
 
PPT
Project scope management
Dhani Ahmad
 
PPT
Chap03 the project management process groups
Dhani Ahmad
 
PPT
Staffing and personal management
Dhani Ahmad
 
PPT
Project management and information technology context
Dhani Ahmad
 
PPT
Opportunities, threats, industry competition, and competitor analysis
Dhani Ahmad
 
PPT
Strategic information system planning
Dhani Ahmad
 
PPT
Chapter20 object oriented analysis and design
Dhani Ahmad
 
Chapter19 rapid application development
Dhani Ahmad
 
Chap01 introduction to project management
Dhani Ahmad
 
Project scope management
Dhani Ahmad
 
Chap03 the project management process groups
Dhani Ahmad
 
Staffing and personal management
Dhani Ahmad
 
Project management and information technology context
Dhani Ahmad
 
Opportunities, threats, industry competition, and competitor analysis
Dhani Ahmad
 
Strategic information system planning
Dhani Ahmad
 
Chapter20 object oriented analysis and design
Dhani Ahmad
 
Ad

Similar to Implementing security (20)

PPT
Project Management of Information Security area (Slide 1)
NgHiAnh12
 
PPT
Information security as an ongoing effort
Dhani Ahmad
 
PDF
Chapter 7 Managing Secure System.pdf
AbuHanifah59
 
PPT
Security and personnel
Dhani Ahmad
 
PPTX
project managmnet
darshan942
 
PPTX
Information Security Blueprint
Zefren Edior
 
PPTX
Whitman_Ch10.pptx
Siphamandla9
 
PPT
Introduction to information security
Dhani Ahmad
 
PPT
Introduction to information security
Kumawat Dharmpal
 
PPT
01Introduction to Information Security.ppt
it160320737038
 
PPT
is_1_Introduction to Information Security
SARJERAO Sarju
 
PDF
Emerging Trends in Information Privacy and Security
Jessica Santamaria
 
PDF
Emerging Trends in Information Privacy and Security
Jessica Santamaria
 
PPTX
Computer security plan
AnKit Mhatre
 
PPTX
Project Management of Information Security area (Slide 2)
NgHiAnh12
 
PPT
Lesson 1- Information Policy
MLG College of Learning, Inc
 
DOCX
I need 10 pages of report and 10 slides PurposeThis course p
doylymaura
 
PDF
CNIT 160 4d Security Program Management (Part 4)
Sam Bowne
 
Project Management of Information Security area (Slide 1)
NgHiAnh12
 
Information security as an ongoing effort
Dhani Ahmad
 
Chapter 7 Managing Secure System.pdf
AbuHanifah59
 
Security and personnel
Dhani Ahmad
 
project managmnet
darshan942
 
Information Security Blueprint
Zefren Edior
 
Whitman_Ch10.pptx
Siphamandla9
 
Introduction to information security
Dhani Ahmad
 
Introduction to information security
Kumawat Dharmpal
 
01Introduction to Information Security.ppt
it160320737038
 
is_1_Introduction to Information Security
SARJERAO Sarju
 
Emerging Trends in Information Privacy and Security
Jessica Santamaria
 
Emerging Trends in Information Privacy and Security
Jessica Santamaria
 
Computer security plan
AnKit Mhatre
 
Project Management of Information Security area (Slide 2)
NgHiAnh12
 
Lesson 1- Information Policy
MLG College of Learning, Inc
 
I need 10 pages of report and 10 slides PurposeThis course p
doylymaura
 
CNIT 160 4d Security Program Management (Part 4)
Sam Bowne
 
Ad

More from Dhani Ahmad (20)

PPT
Strategic planning
Dhani Ahmad
 
PPT
Information system
Dhani Ahmad
 
PPT
Information resource management
Dhani Ahmad
 
PPT
Types of islamic institutions and records
Dhani Ahmad
 
PPT
Islamic information seeking behavior
Dhani Ahmad
 
PPT
Islamic information management
Dhani Ahmad
 
PPT
Islamic information management sources in islam
Dhani Ahmad
 
PPT
The information security audit
Dhani Ahmad
 
PPT
Security technologies
Dhani Ahmad
 
PPT
Security policy
Dhani Ahmad
 
PPT
Secure
Dhani Ahmad
 
PPT
Risk management ii
Dhani Ahmad
 
PPT
Risk management i
Dhani Ahmad
 
PPT
Privacy & security in heath care it
Dhani Ahmad
 
PPT
Physical security
Dhani Ahmad
 
PPT
Legal, ethical & professional issues
Dhani Ahmad
 
PPT
Disaster recovery & business continuity
Dhani Ahmad
 
PPT
Chapter2 the need to security
Dhani Ahmad
 
PPT
Topic 12 report & presentations
Dhani Ahmad
 
PPT
Topic 11 data management
Dhani Ahmad
 
Strategic planning
Dhani Ahmad
 
Information system
Dhani Ahmad
 
Information resource management
Dhani Ahmad
 
Types of islamic institutions and records
Dhani Ahmad
 
Islamic information seeking behavior
Dhani Ahmad
 
Islamic information management
Dhani Ahmad
 
Islamic information management sources in islam
Dhani Ahmad
 
The information security audit
Dhani Ahmad
 
Security technologies
Dhani Ahmad
 
Security policy
Dhani Ahmad
 
Secure
Dhani Ahmad
 
Risk management ii
Dhani Ahmad
 
Risk management i
Dhani Ahmad
 
Privacy & security in heath care it
Dhani Ahmad
 
Physical security
Dhani Ahmad
 
Legal, ethical & professional issues
Dhani Ahmad
 
Disaster recovery & business continuity
Dhani Ahmad
 
Chapter2 the need to security
Dhani Ahmad
 
Topic 12 report & presentations
Dhani Ahmad
 
Topic 11 data management
Dhani Ahmad
 

Recently uploaded (20)

PPT
introduction to networking with basics coverage
RamananMuthukrishnan
 
PPTX
sajflsajfljsdfljslfjslfsdfas;fdsfksadfjlsdflkjslgfs;lfjlsajfl;sajfasfd.pptx
theknightme
 
PPT
Computer Securityyyyyyyy - Chapter 1.ppt
SolomonSB
 
PPTX
原版西班牙莱昂大学毕业证(León毕业证书)如何办理
Taqyea
 
PPTX
一比一原版(LaTech毕业证)路易斯安那理工大学毕业证如何办理
Taqyea
 
PPTX
L1A Season 1 Guide made by A hegy Eng Grammar fixed
toszolder91
 
PDF
AI_MOD_1.pdf artificial intelligence notes
shreyarrce
 
PPTX
INTEGRATION OF ICT IN LEARNING AND INCORPORATIING TECHNOLOGY
kvshardwork1235
 
PPTX
Lec15_Mutability Immutability-converted.pptx
khanjahanzaib1
 
PPTX
本科硕士学历佛罗里达大学毕业证(UF毕业证书)24小时在线办理
Taqyea
 
PDF
Azure_DevOps introduction for CI/CD and Agile
henrymails
 
PDF
𝐁𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓
hokimamad0
 
PPTX
Presentation3gsgsgsgsdfgadgsfgfgsfgagsfgsfgzfdgsdgs.pptx
SUB03
 
PPTX
一比一原版(SUNY-Albany毕业证)纽约州立大学奥尔巴尼分校毕业证如何办理
Taqyea
 
PPTX
法国巴黎第二大学本科毕业证{Paris 2学费发票Paris 2成绩单}办理方法
Taqyea
 
PPTX
unit 2_2 copy right fdrgfdgfai and sm.pptx
nepmithibai2024
 
PPTX
ONLINE BIRTH CERTIFICATE APPLICATION SYSYTEM PPT.pptx
ShyamasreeDutta
 
PPTX
PE introd.pptxfrgfgfdgfdgfgrtretrt44t444
nepmithibai2024
 
PPTX
Orchestrating things in Angular application
Peter Abraham
 
PDF
Build Fast, Scale Faster: Milvus vs. Zilliz Cloud for Production-Ready AI
Zilliz
 
introduction to networking with basics coverage
RamananMuthukrishnan
 
sajflsajfljsdfljslfjslfsdfas;fdsfksadfjlsdflkjslgfs;lfjlsajfl;sajfasfd.pptx
theknightme
 
Computer Securityyyyyyyy - Chapter 1.ppt
SolomonSB
 
原版西班牙莱昂大学毕业证(León毕业证书)如何办理
Taqyea
 
一比一原版(LaTech毕业证)路易斯安那理工大学毕业证如何办理
Taqyea
 
L1A Season 1 Guide made by A hegy Eng Grammar fixed
toszolder91
 
AI_MOD_1.pdf artificial intelligence notes
shreyarrce
 
INTEGRATION OF ICT IN LEARNING AND INCORPORATIING TECHNOLOGY
kvshardwork1235
 
Lec15_Mutability Immutability-converted.pptx
khanjahanzaib1
 
本科硕士学历佛罗里达大学毕业证(UF毕业证书)24小时在线办理
Taqyea
 
Azure_DevOps introduction for CI/CD and Agile
henrymails
 
𝐁𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓
hokimamad0
 
Presentation3gsgsgsgsdfgadgsfgfgsfgagsfgsfgzfdgsdgs.pptx
SUB03
 
一比一原版(SUNY-Albany毕业证)纽约州立大学奥尔巴尼分校毕业证如何办理
Taqyea
 
法国巴黎第二大学本科毕业证{Paris 2学费发票Paris 2成绩单}办理方法
Taqyea
 
unit 2_2 copy right fdrgfdgfai and sm.pptx
nepmithibai2024
 
ONLINE BIRTH CERTIFICATE APPLICATION SYSYTEM PPT.pptx
ShyamasreeDutta
 
PE introd.pptxfrgfgfdgfdgfgrtretrt44t444
nepmithibai2024
 
Orchestrating things in Angular application
Peter Abraham
 
Build Fast, Scale Faster: Milvus vs. Zilliz Cloud for Production-Ready AI
Zilliz
 

Implementing security

  • 1. TransformingLives. InventingtheFuture. www.iit.edu I ELLINOIS T UINS TI T OF TECHNOLOGY ITM 578 1 Implementing Security Ray Trygstad ITM 478/578 Spring 2004 Information Technology & Management Degree Programs CenterforProfessional Development Slides based on Whitman, M. and Mattord, H., Principles of InformationSecurity; Thomson Course Technology 2003
  • 2. ITM 578 2 ILLINOIS INSTITUTE OF TECHNOLOGY Learning Objectives Upon completion of this lesson the student should be able to: – Describe how the organization’s security blueprint becomes a project plan – Discuss the numerous organizational considerations that must be addressed by the project plan – Discribe the significant role and importance of the project manager in the success of an information security project
  • 3. ITM 578 3 ILLINOIS INSTITUTE OF TECHNOLOGY Learning Objectives Upon completion of this lesson the student should be able to: – Discuss the need for professional project management for complex projects – Describe technical strategies and models for implementing the project plan – Recognize nontechnical problems that organizations face in times of rapid change
  • 4. ITM 578 4 ILLINOIS INSTITUTE OF TECHNOLOGY
  • 5. ITM 578 5 ILLINOIS INSTITUTE OF TECHNOLOGY Introduction  In general the implementation phase is accomplished by changing the configuration and operation of the organization’s information systems to make them more secure.  It includes changes to: – Procedures (through policy) – People (through training) – Hardware (through firewalls) – Software (through encryption) – Data (perhaps through classification)
  • 6. ITM 578 6 ILLINOIS INSTITUTE OF TECHNOLOGY Introduction During the implementation phase, the organization translates its blueprint for information security into a concrete project plan The project plan delivers instructions to the individuals who are executing the implementation
  • 7. ITM 578 7 ILLINOIS INSTITUTE OF TECHNOLOGY Introduction  These instructions focus on the security control changes needed to the hardware, software, procedures, data, and people that make up the organization’s information systems  But before a project plan can be developed, management should have articulated and coordinated the information security vision and objectives involved in the execution of the plan
  • 8. ITM 578 8 ILLINOIS INSTITUTE OF TECHNOLOGY Analyze Physical Design Implementa tion: Implementing Security Chapter 10 Logical Design Maintain FIG URE 10-1 Implementation Phase within the SecSDLC Implementa tion: Personnel & Security Chapter 11 Implementation Phase
  • 9. ITM 578 9 ILLINOIS INSTITUTE OF TECHNOLOGY Project Management Once the organization’s vision and objectives are documented and understood, the blueprint can be turned into a project plan The major steps in executing the project plan are: – Planning the project – Supervising tasks and maintaining control – Wrapping up the project plan
  • 10. ITM 578 10 ILLINOIS INSTITUTE OF TECHNOLOGY Project Management The project plan can be developed in any number of ways Each organization has to determine its own project management methodology for IT and information security projects
  • 11. ITM 578 11 ILLINOIS INSTITUTE OF TECHNOLOGY Project Management Whenever possible, information security projects should follow the organizational practices of project management. If your organization does not have clearly defined project management practices, the following general guidelines on project management practices can be applied
  • 12. ITM 578 12 ILLINOIS INSTITUTE OF TECHNOLOGY Developing the Project Plan  Creation of a detailed project plan using a simple planning tool, such as the work breakdown structure (WBS) – Common task attributes are: • Work to be accomplished (activities and deliverables) • Individuals (or skills set) assigned to perform the task • Start and end dates for the task (when known) • Amount of effort required for completion in hours or work days • Estimated capital expenses for the task • Estimated non-capital expenses for the task • Other tasks on which the task depends – Each major task is then further divided into either smaller tasks or specific action steps
  • 13. ITM 578 13 ILLINOIS INSTITUTE OF TECHNOLOGY Project Planning  As the project plan is developed, adding detail to the plan not always straightforward  Special considerations include: – financial – priority – time – staff – scope – procurement – organizational feasibility – training and indoctrination – change control and technology governance
  • 14. ITM 578 14 ILLINOIS INSTITUTE OF TECHNOLOGY Developing the Project Plan Each major task is then further divided into either smaller tasks or specific action steps. Key components of the project plan are: – Identify Work To Be Accomplished. – Describe the skill set or individual person needed to accomplish the task. – Focus on determining only completion dates for major milestones.
  • 15. ITM 578 15 ILLINOIS INSTITUTE OF TECHNOLOGY Developing the Project Plan – Estimate the expected capital expenses for the completion of this task, subtask, or action item. – Estimate the expected non-capital expenses for the completion of the task, subtask, or action item. – Note wherever possible the dependencies of other tasks or action steps on the task or action step at hand.
  • 16. ITM 578 16 ILLINOIS INSTITUTE OF TECHNOLOGY Financial No matter what information security needs exist in the organization, the amount of effort that can be expended depends on the funds available Cost-benefit analysis must be verified prior to development of the project plan
  • 17. ITM 578 17 ILLINOIS INSTITUTE OF TECHNOLOGY Financial Both public and private organizations have budgetary constraints, albeit of a different nature To justify an amount budgeted for a security project at either public or for-profit organizations, it may be useful to benchmark expenses of similar organizations
  • 18. ITM 578 18 ILLINOIS INSTITUTE OF TECHNOLOGY Priority  In general, the most important information security controls should be scheduled first  The implementation of controls is guided by the prioritization of threats and the value of the information assets threatened  A control that costs a little more and is a little lower on the prioritization list but addresses many more specific vulnerabilities and threats have higher priority than a less expensive, higher priority component that only addresses one particular vulnerability
  • 19. ITM 578 19 ILLINOIS INSTITUTE OF TECHNOLOGY Time and Scheduling  Time is another constraint that has a broad impact on the development of the project plan  Time can impact dozens of points in the development of a project plan including the following: – time to order and receive a security control due to backlogs of the vendor or manufacturer – time to install and configure the control – time to train the users – time to realize the return on investment of the control
  • 20. ITM 578 20 ILLINOIS INSTITUTE OF TECHNOLOGY Staffing  The lack of enough qualified, trained, and available personnel also constrains the project plan  Experienced staff is often needed to implement available technologies and to develop and implement policies and training programs  If no staff members are trained to configure a firewall that is being purchased, someone must be trained, or someone must be hired who is experienced with that particular technology
  • 21. ITM 578 21 ILLINOIS INSTITUTE OF TECHNOLOGY Scope  It is unrealistic for an organization to install all information security components at once  In addition to the constraints of handling so many complex tasks at one time, there are the problems of interrelated conflicts between the installation of information security controls and the daily operations of the organization  The installation of new information security controls may also conflict with existing controls
  • 22. ITM 578 22 ILLINOIS INSTITUTE OF TECHNOLOGY Procurement  All IT and information security planners must consider the acquisition of goods and services  There are a number of constraints on the selection process for equipment and services in most organizations, specifically in the selection of certain service vendors or products from manufacturers and suppliers  These constraints may change the specifics of a particular technology or even eliminate it from the realm of possibilities
  • 23. ITM 578 23 ILLINOIS INSTITUTE OF TECHNOLOGY Organizational Feasibility Policies require time to develop and new technologies require time to be installed, configured, and tested Employees need to understand how a new program impacts their working lives
  • 24. ITM 578 24 ILLINOIS INSTITUTE OF TECHNOLOGY Organizational Feasibility The goal of the project plan is to avoid new security components from directly impacting the day-to-day operations of the individual employees Changes should be transparent to users, unless the new technology causes changes to procedures, such as requiring additional authentication or verification
  • 25. ITM 578 25 ILLINOIS INSTITUTE OF TECHNOLOGY Training and Indoctrination The size of the organization and the normal conduct of business may preclude a single large training program As a result, the organization should conduct a phased in or pilot approach to implementation, such as “roll-out” training for one department at a time
  • 26. ITM 578 26 ILLINOIS INSTITUTE OF TECHNOLOGY Training and Indoctrination In the case of policies, it may be sufficient to brief all supervisors on new policy and then have the supervisors update end users in normal meetings Ensure that compliance documents are also distributed, requiring all employees to read, understand, and agree to the new policies
  • 27. ITM 578 27 ILLINOIS INSTITUTE OF TECHNOLOGY Change Control & Technology Governance In organizations that have IT infrastructures of significant size, the change control and technology governance issues become essential
  • 28. ITM 578 28 ILLINOIS INSTITUTE OF TECHNOLOGY Project Management Project management requires a unique set of skills and a thorough understanding of a broad body of specialized knowledge It is a realistic assumption that most information security projects require a trained project manager, CISO, or skilled IT manager versed in project management techniques to oversee the project
  • 29. ITM 578 29 ILLINOIS INSTITUTE OF TECHNOLOGY Project Management In addition, when selecting advanced or integrated technologies or outsourced services even experienced project managers are advised to seek expert assistance when engaging in a formal bidding process
  • 30. ITM 578 30 ILLINOIS INSTITUTE OF TECHNOLOGY Supervising Implementation Some organizations may designate a champion from general management to supervise the implementation of the project plan An alternative is to designate a senior IT manager or the CIO of the organization to lead the implementation
  • 31. ITM 578 31 ILLINOIS INSTITUTE OF TECHNOLOGY Supervising Implementation The optimal solution is to designate a suitable person from the information security community of interest, since the inherent focus is on the information security needs of the organization It is up to each organization to find the leadership for a successful project implementation
  • 32. ITM 578 32 ILLINOIS INSTITUTE OF TECHNOLOGY Executing the Plan Using negative feedback loop to control project execution: – Progress is measured periodically – Measured results are compared against expected results – When significant deviation occurs, corrective action taken •When corrective action is required either the estimate was flawed or performance has lagged
  • 33. ITM 578 33 ILLINOIS INSTITUTE OF TECHNOLOGY Executing the Plan – When an estimate is flawed the plan should be corrected and downstream tasks updated to reflect the change – When performance has lagged add resources, lengthen the schedule, or reduce the quality or quantity of the deliverables •The decisions are usually expressed in terms of trade-offs •Often a project manager can adjust one of the three planning parameters
  • 34. ITM 578 34 ILLINOIS INSTITUTE OF TECHNOLOGY Negative Feedback Loop FIGURE 10-2 Negative Feedback Loop Plan is developedPlan is developed WorkWork Progress is measuredProgress is measured Corrective actionCorrective action Complete?Complete? Project isProject is completecomplete On target?On target? YesYes YesYes NoNo NoNo
  • 35. ITM 578 35 ILLINOIS INSTITUTE OF TECHNOLOGY Executing the Plan When corrective action is required, there are two basic situations: either the estimate was flawed or performance has lagged When an estimate is flawed, for example a faulty estimate for effort hours is discovered, the plan should be corrected and downstream tasks updated to reflect the change
  • 36. ITM 578 36 ILLINOIS INSTITUTE OF TECHNOLOGY Executing the Plan When performance has lagged, for example due to high turnover of skilled employees, correction is required by adding resources, lengthening the schedule, or by reducing the quality or quantity of the deliverable
  • 37. ITM 578 37 ILLINOIS INSTITUTE OF TECHNOLOGY Technical Topics of Implementation Some parts of the implementation process are technical in nature, dealing with the application of technology, while others are not, dealing instead with the human interface to technical systems
  • 38. ITM 578 38 ILLINOIS INSTITUTE OF TECHNOLOGY Executing the Plan Decisions are usually expressed in terms of trade-offs Often a project manager can adjust one of the three planning parameters for the task being corrected: – Effort and money allocated – Elapsed time or scheduling impact – Quality or quantity of the deliverable
  • 39. ITM 578 39 ILLINOIS INSTITUTE OF TECHNOLOGY Wrap-up  Project wrap-up is usually handled as a procedural task assigned to a mid-level IT or information security manager  These managers collect documentation, finalize status reports, and deliver a final report and a presentation at a wrap-up meeting  The goal of the wrap-up is to resolve any pending issues, critique the overall effort of the project, and draw conclusions about how to improve the process for the future
  • 40. ITM 578 40 ILLINOIS INSTITUTE OF TECHNOLOGY Conversion Strategies As the components of the new security system are planned, provisions must be made for the changeover from the previous method of performing a task to the new methods
  • 41. ITM 578 41 ILLINOIS INSTITUTE OF TECHNOLOGY Conversion Strategies – Direct changeover: also known as going “cold turkey,” involves stopping the old method and beginning the new. – Phase implementation: the most common approach, involves rolling out a piece of the system across the entire organization.
  • 42. ITM 578 42 ILLINOIS INSTITUTE OF TECHNOLOGY Conversion Strategies (continued) – Pilot implementation: involves implementing all security improvements in a single office, department, or division, and resolving issues within that group before expanding to the rest of the organization. – Parallel operations: involve running the new methods alongside the old methods.
  • 43. ITM 578 43 ILLINOIS INSTITUTE OF TECHNOLOGY The Bull’s-Eye Model  By reviewing the information security blueprint and the current state of the organization’s information security efforts in terms of the four layers of the bulls-eye model, project planners can find guidance about where to lobby for expanded information security capabilities  This approach relies on a process of evaluating project plans in a progression through four layers: policy, network, systems and applications
  • 44. ITM 578 44 ILLINOIS INSTITUTE OF TECHNOLOGY The Bull’s-Eye Model  Use the blueprint and the current state of information security efforts and the four layers of the bull’s-eye model, to find guidance about where to focus - progressing through policy, networks, systems, and applications. – Sound and useable IT and information security policy comes first – Network controls are designed and deployed next – Information, process, and manufacturing systems of the organization are secured next – Assessment and remediation of the security of the organization’s applications is the final step
  • 45. ITM 578 45 ILLINOIS INSTITUTE OF TECHNOLOGY The Bull’s-Eye Model FIGURE 10-3 The Bull’s-Eye Model PoliciesPolicies NetworksNetworks SystemsSystems ApplicationsApplications
  • 46. ITM 578 46 ILLINOIS INSTITUTE OF TECHNOLOGY To Outsource or Not  Just as some organizations outsource IT operations, organizations can outsource part or all of their information security programs  When an organization has outsourced IT services, information security should be part of the contract arrangement with the outsourcer  Because of the complex nature of outsourcing, the best advice is to hire the best outsourcing specialists, and then have the best attorney possible negotiate and verify the legal and technical intricacies of the outsourcing contract
  • 47. ITM 578 47 ILLINOIS INSTITUTE OF TECHNOLOGY Technology Governance & Change Control Other factors that determine the success of an organization’s IT and information security are technology governance and change control processes Technology governance is a complex process that an organization uses to manage the impacts and costs caused by technology implementation, innovation, and obsolescence
  • 48. ITM 578 48 ILLINOIS INSTITUTE OF TECHNOLOGY Technology Governance & Change Control Technology governance also facilitates the communication about technical advances and issues across the organization Medium or large organizations deal with the impact of technical change on the operation of the organization through a change control process
  • 49. ITM 578 49 ILLINOIS INSTITUTE OF TECHNOLOGY Technology Governance & Change Control  By managing the process of change: – Improve communication about change – Enhance coordination between organizational groups as change is scheduled and completed – Reduce unintended consequences by having a process to resolve potential conflict and disruption – Improve quality of service as potential failures are eliminated and groups work together – Assure management that all groups are complying with the organization’s policies regarding technology governance, procurement, accounting, and information security
  • 50. ITM 578 50 ILLINOIS INSTITUTE OF TECHNOLOGY Nontechnical Topics of Implementation Other parts of the implementation process are not technical in nature, dealing with the human interface to technical systems These include the topics of creating a culture of change management as well as some considerations for organizations facing change
  • 51. ITM 578 51 ILLINOIS INSTITUTE OF TECHNOLOGY Culture of Change The prospect of change can cause employees to unconsciously or consciously resist The stress of change can increase the probability of mistakes or create vulnerabilities Resistance to change can be lowered by building resilience for change
  • 52. ITM 578 52 ILLINOIS INSTITUTE OF TECHNOLOGY Culture of Change One of the oldest models of making change is the Lewin change model: – Unfreezing: “thawing out” hard and fast habits and established procedures. – Moving: the transition between the old way and the new. – Refreezing: the integration of the new methods into the organizational culture.
  • 53. ITM 578 53 ILLINOIS INSTITUTE OF TECHNOLOGY Considerations in Change In order to make an organization more amenable to change, some steps can be taken: – reducing resistance to change from the beginning of the planning process – steps taken to modify the organization to be more accepting of change
  • 54. ITM 578 54 ILLINOIS INSTITUTE OF TECHNOLOGY Reducing Resistance  The more ingrained the previous methods and behaviors, the more difficult the change  The primary mechanism used to overcome this resistance to change is to improve the interaction between the affected members of the organization and the project planners in the earlier phases of the SecSDLC  The guideline to improve this interaction is a three-step process: – communicate – educate – involve
  • 55. ITM 578 55 ILLINOIS INSTITUTE OF TECHNOLOGY Developing Support for Change  The best situation is an organization with a culture that is beyond low resistance to change but fosters resilience for change  This resilience means the organization has come to expect that change is a necessary part of organizational culture, and that to embrace change is more productive than fighting it  To develop such a culture the organization must successfully accomplish many projects that require change
  • 56. ITM 578 56 ILLINOIS INSTITUTE OF TECHNOLOGY The End… Questions?

Editor's Notes

  • #3: LEARNING OBJECTIVES: Upon completion of this material you should be able to: Understand how the organization’s security blueprint becomes a project plan Identify the main components of a project using the work breakdown structure (WBS) method Grasp the significant role and importance of the project manger in the success of an information security project Understand the need for professional project management for complex projects Identify the key elements of the bull’s-eye method as presented in this chapter Grasp the problems that organizations face in times of rapid change
  • #4: LEARNING OBJECTIVES: Upon completion of this material you should be able to: Understand how the organization’s security blueprint becomes a project plan Identify the main components of a project using the work breakdown structure (WBS) method Grasp the significant role and importance of the project manger in the success of an information security project Understand the need for professional project management for complex projects Identify the key elements of the bull’s-eye method as presented in this chapter Grasp the problems that organizations face in times of rapid change
  • #6: In general the implementation phase is accomplished by changing the configuration and operation of the organization’s information systems to make them more secure. It includes changes to: Procedures (through policy) People (through training) Hardware (through firewalls) Software (through encryption) Data (perhaps through classification)
  • #7: During the implementation phase, the organization translates its blueprint for information security into a concrete project plan The project plan delivers instructions to the individuals who are executing the implementation
  • #8: These instructions focus on the security control changes needed to the hardware, software, procedures, data, and people that make up the organization’s information systems But before a project plan can be developed, management should have articulated and coordinated the information security vision and objectives involved in the execution of the plan
  • #9: Introduction Implementation is accomplished through translating its blueprint into a concrete project plan including changes to: Procedures (through policy) People (through training) Hardware (through firewalls) Software (through encryption) Data (perhaps through classification) But before a project plan can be developed, management should have articulated and coordinated the information security vision and objectives involved in the execution of the plan
  • #10: Project Management In the Implementation Phase Once the organization’s vision and objectives are documented and understood, the processes for translating the blueprint into a project plan can be defined. Organizational change is not easily accomplished. The major steps in executing the project plan are: Planning the project Supervising tasks and action steps within the project plan Wrapping up the project plan The project plan can be developed in any number of ways. Each organization has to determine its own project management methodology for IT and information security projects. Whenever possible, information security projects should follow the organizational practices of project management. If your organization does not have clearly defined project management practices, the following general guidelines on project management practices can be applied.
  • #11: The project plan can be developed in any number of ways Each organization has to determine its own project management methodology for IT and information security projects
  • #12: Whenever possible, information security projects should follow the organizational practices of project management. If your organization does not have clearly defined project management practices, the following general guidelines on project management practices can be applied
  • #13: Developing the Project Plan Planning for the implementation phase involves the creation of a detailed project plan. The creation of the project plan can be accomplished using a simple planning tool, such as the work breakdown structure (WBS). Common task attributes are: Work to be accomplished (activities and deliverables) Individuals (or skills set) assigned to perform the task Start and end dates for the task (when known) Amount of effort required for completion in hours or work days Estimated capital expenses for the task Estimated non-capital expenses for the task Other tasks on which the task depends Each major task is then further divided into either smaller tasks or specific action steps. Key components of the project plan are: Identify Work To Be Accomplished. Describe the skill set or individual person needed to accomplish the task. Focus on determining only completion dates for major milestones. Estimate the expected capital expenses for the completion of this task, subtask, or action item. Estimate the expected non-capital expenses for the completion of the task, subtask, or action item. Note wherever possible the dependencies of other tasks or action steps on the task or action step at hand.
  • #14: Project Planning Considerations As the project plan is developed, adding detail to the plan is not always straightforward. Special considerations include: financial, priority, time, staff, scope, procurement, organizational feasibility, training and indoctrination and change control and technology governance
  • #17: Financial Considerations No matter what information security needs exist in the organization, the amount of effort that can be expended depends on the funds available. A cost-benefit analysis prepared earlier in the life cycle, must be verified prior to development of the project plan. In many organizations, the information security budget is a subsection of the overall IT budget. In others, information security is a separate budget category that may have parity with the IT budget.
  • #18: Both public and private organizations have budgetary constraints, albeit of a different nature. To justify an amount budgeted for a security project at either public or for-profit organizations, it may be useful to benchmark expenses of similar organizations.
  • #19: Priority Considerations In general, the most important information security controls should be scheduled first. The implementation of controls is guided by the prioritization of threats and the value of the information assets threatened. A control that costs a little more and is a little lower on the prioritization list but addresses many more specific vulnerabilities and threats have higher priority than a less expensive, higher priority component that only addresses one particular vulnerability.
  • #20: Time and Scheduling Considerations Time is another constraint that has a broad impact on the development of the project plan. Time can impacts dozens of points in the development of a project plan including the following: time to order and receive a security control due to backlogs of the vendor or manufacturer; time to install and configure the control; time to train the users; and time to realize the return on investment of the control.
  • #21: Staffing Considerations The lack of enough qualified, trained, and available personnel also constrains the project plan. Experienced staff is often needed to implement available technologies and to develop and implement policies and training programs. If no staff members are trained to configure a firewall that is being purchased, someone must be trained, or someone must be hired who is experienced with that particular technology.
  • #22: Scope Considerations It is unrealistic for an organization to install all information security components at once. The project plan should not attempt to implement the entire security system at one time. In addition to the constraints of handling so many complex tasks at one time, there are the problems of interrelated conflicts between the installation of information security controls and the daily operations of the organization. The installation of new information security controls may also conflict with existing controls.
  • #23: Procurement Considerations All IT and information security planners must consider the acquisition of goods and services. There are a number of constraints on the selection process for equipment and services in most organizations, specifically in the selection of certain service vendors or products from manufacturers and suppliers. These constraints may change the specifics of a particular technology or even eliminate it from the realm of possibilities.
  • #24: Organizational Feasibility Considerations Policies require time to develop and new technologies require time to be installed, configured, and tested. Employees need to understand how a new infosec program impacts their working lives. The goal of the project plan is to avoid new security components from directly impacting the day-to-day operations of the individual employees. This means that changes should be transparent to systems users, unless the new technology causes changes to procedures, such as requiring additional authentication or verification.
  • #26: Training and Indoctrination Considerations The size of the organization and the normal conduct of business may preclude a single large training program on security procedures or technologies. As a result, the organization should conduct a phased in or pilot approach to implementation, such as “roll-out” training for one department at a time.
  • #27: In the case of policies, it may be sufficient to brief all supervisors on new policy and then have the supervisors update end users in normal meetings. Ensure that compliance documents are also distributed, requiring all employees to read, understand, and agree to the new policies.
  • #28: Change Control and Technology Governance Considerations In organizations that have IT infrastructures of significant size, the change control and technology governance issues become essential.
  • #29: The Need for Project Management Project management requires a unique set of skills and a thorough understanding of a broad body of specialized knowledge. It is a realistic assumption that most information security projects require a trained project manager, CISO, or skilled IT manager versed in project management techniques to oversee the project.
  • #30: In addition, when selecting advanced or integrated technologies or outsourced services even experienced project managers are advised to seek expert assistance when engaging in a formal bidding process.
  • #31: Supervising Implementation Some organizations may designate a champion from general management to supervise the implementation of the project plan for security information. An alternative is to designate a senior IT manager or the CIO of the organization to lead the implementation.
  • #32: The optimal solution is to designate a suitable person from the information security community of interest, since the inherent focus is on the information security needs of the organization. In the final analysis, it is up to each organization to find the leadership for a successful project implementation that best suits its specific needs and the personalities and politics of the organizational culture.
  • #33: Executing the Plan Once a project is underway, it is managed to completion using a process known as a negative feedback loop or cybernetic loop, which ensures that progress is measured periodically. The measured results are compared against expected results. When significant deviation occurs, corrective action is taken to bring the task that is deviating from plan back into compliance with the projection, or else the estimate is revised in light of new information. When corrective action is required, there are two basic situations: either the estimate was flawed or performance has lagged.
  • #34: When an estimate is flawed, for example a faulty estimate for effort hours is discovered, the plan should be corrected and downstream tasks updated to reflect the change. When performance has lagged, for example due to high turnover of skilled employees, correction is required by adding resources, lengthening the schedule, or by reducing the quality or quantity of the deliverable. The decisions are usually expressed in terms of trade-offs. Often a project manager can adjust one of the three planning parameters for the task being corrected: 1.Effort and money allocated 2.Elapsed time or scheduling impact 3.Quality or quantity of the deliverable
  • #38: Technical Topics Of Implementation Some parts of the implementation process are technical in nature, dealing with the application of technology, while others are not, dealing instead with the human interface to technical systems.
  • #40: Wrap-up Project wrap-up is usually handled as a procedural task assigned to a mid-level IT or information security manager. These managers collect documentation, finalize status reports, and deliver a final report and a presentation at a wrap-up meeting. The goal of the wrap-up is to resolve any pending issues, critique the overall effort of the project, and draw conclusions about how to improve the process for the future.
  • #41: Conversion Strategies As the components of the new security system are planned, provisions must be made for the changeover from the previous method of performing a task to the new methods. 1. Direct changeover: Also known as going “cold turkey,” involves stopping the old method and beginning the new. 2. Phase implementation: the most common approach, involves rolling out a piece of the system across the entire organization. 3. Pilot implementation: involves implementing all security improvements in a single office, department, or division, and resolving issues within that group before expanding to the rest of the organization. 4. Parallel operations: involve running the new methods alongside the old methods.
  • #45: The Bull’s-eye Model for InfoSec Project Planning By reviewing the information security blueprint and the current state of the organization’s information security efforts in terms of the four layers of the bulls-eye model, project planners can find guidance about where to lobby for expanded information security capabilities. This approach relies on a process of evaluating project plans in a progression through four layers: policy, network, systems and applications. The bull’s-eye model can be used to evaluate the sequence of steps taken to integrate parts of the information security blueprint into a project plan, meaning that: Until sound and useable IT and information security policy is developed, communicated, and enforced, no additional resources should be spent on other controls. Until effective network controls are designed and deployed, all resources should be spent to achieve that goal. After policy and network controls are implemented, implementation should focus on the information, process, and manufacturing systems of the organization. Once there is assurance that policy is in place, networks are secure, and systems are safe, attention should move to the assessment and remediation of the security of the organization’s applications.
  • #47: To Outsource or Not Just as some organizations outsource IT operations, so too can organizations outsource part of or all of their information security programs. When an organization has outsourced IT services, information security should be part of the contract arrangement with the outsourcer. Because of the complex nature of outsourcing, the best advice is to hire the best outsourcing specialists, and then have the best attorney possible negotiate and verify the legal and technical intricacies of the outsourcing contract.
  • #51: Non-Technical Topics Of Implementation Other parts of the implementation process are not technical in nature, dealing with the human interface to technical systems. These include the topics of creating a culture of change management as well as a some considerations for organizations facing change.
  • #52: The Culture of Change Management In any major project, the prospect of change, the familiar shifting to the unfamiliar, can cause employees to unconsciously or consciously resist. Even when employees embrace changes, the stress of making changes and adjusting to the new procedures can increase the probability of mistakes or create vulnerabilities in the system. By understanding and applying some of the basic tenets of change management, the resistance to change can be lowered, and you can even build resilience for changes, making ongoing change more palatable to the entire organization.
  • #53: One of the oldest models of making change is the Lewin change model , which consists of: Unfreezing: “thawing out” hard and fast habits and established procedures. Moving: the transition between the old way and the new. Refreezing: the integration of the new methods into the organizational culture, by creating an atmosphere in which the changes are accepted as the preferred way of accomplishing the requisite tasks.
  • #54: Considerations for Organizational Change In order to make an organization more amenable to change, some steps can be taken. This includes reducing resistance to change fro the beginning of the planning process and steps taken to modify the organization to be more accepting of change.
  • #55: Reducing Resistance to Change from the Start The level of resistance to change impacts the ease with which an organization works through the process described. The more ingrained the previous methods and behaviors, the more difficult the change. The primary mechanism used to overcome this resistance to change is to improve the interaction between the affected members of the organization and the project planners in the earlier phases of the SecSDLC. The guideline to improve this interaction is a three-step process: communicate, educate, and involve.
  • #56: Reducing Resistance to Change from the Start The level of resistance to change impacts the ease with which an organization works through the process described. The more ingrained the previous methods and behaviors, the more difficult the change. The primary mechanism used to overcome this resistance to change is to improve the interaction between the affected members of the organization and the project planners in the earlier phases of the SecSDLC. The guideline to improve this interaction is a three-step process: communicate, educate, and involve.