Plan For Sirius Council Borough Of Betelgeuse

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Document Number:

IAP - 7514338

Issue:

Author:

GOKULANATHAN MURTHY

Approval Authority:

Chief Executive of the Council

Distribution:

Each Service group’s head

Risk assessment group participants:

ANTONY AROKYA DAS GILBERT - 7567197

ISRAH ELRAJHY-7544726

ASEIM SAFAYA-7576502

MANJARI KUPPAYIL SAJI-7536043

CHARALAMBOS LAOS-7515288

NOHA ALNAZZAWI-7461593

CHIOASCA EROL VALERIU-7497701

ROOPA DAS-7521367

EIRINI ALEVIZOU-7489024

SURENDIRAN SHANMUGAM-7500624

ETIKO OLUWATOYIN-7511654

TEMILOLA ABIMBOLA OTI-7524152

GAURAV AGARWAL-7536485

Modification History

Revision

Date

Revision Description

0.01

02/01/2010

Initial draft

0.02

13/01/2010

Updated Risk treatment and counter measures

0.02

14/01/2010

Updated Business continuity plan

1.0

16/01/2010

Final

Contents

1. Modification History 2

2. Contents 3

3. System Objectives 7

3.1. Purpose 7

3.1.1. Information security 7

3.2. Information Lifecycle and Classification 7

3.2.1. Information assets (Physical) 7

3.2.2. Information Assets (Logical) 8

3.3. Relevant Topics for Compliance 8

3.3.1. Regulations 8

3.3.2. Standards 8

3.4. Responsibilities and Excepted Characteristics of Stakeholders and Users 8

3.4.1. Human Resources Manager 8

3.4.2. Security Manager 9

3.4.3. Line of Business Manager 9

3.4.4. Operations Manager 9

3.4.5. Network Manager 9

3.4.6. IT Manager 9

3.4.7. Voice Service Manager 9

3.4.8. Database Administrator 9

3.4.9. Employees 9

3.5. Protection Profile 10

4. Asset Register 10

4.1. Asset Identification 10

4.2. Asset Ownership 10

4.3. Asset Classification 10

5. Risk Assessment 11

6. Risk Treatment and Countermeasures 11

6.1. Application Threats and Countermeasures 12

Spoofing 12

Tampering 12

Information disclosure 12

Denial of Service 12

Elevation of privilege 12

6.2. Network Threats and Countermeasures 13

Information Gathering 13

Sniffing 13

Spoofing 13

Denial of Service 13

6.3. Software Threats and Countermeasures 14

6.4. Information Security policy 15

6.5. Access control Policy 15

6.6. Email & Internet Usage 16

6.7. Data management 16

6.8. Personal Security Policy 16

6.9. Physical Security policy 17

6.10. Equipment Security Policy 17

6.11. General Security policy 18

6.12. Third Part Security policy 18

7. Business continuity 18

7.1. Business Continuity Objectives 19

7.2. Business Impact Analysis 19

7.3. Business Continuity Plan 19

7.3.1. Prioritisation 19

7.4. Contacts 21

7.5. Incident Management 22

7.5.1. Incident Identification 22

7.5.2. Incident Classification 22

7.5.3. Incident Response 22

7.5.4. Incident Recovery 22

7.5.5. Incident Prevention 23

7.6. Response and Recovery Checklist 23

7.7. Log Sheet 24

7.8. Audits 24

7.9. Testing the BCP 24

8. Disaster Recovery 25

8.1. Emergency Response during disaster 25

8.2. Disaster Recovery Team 25

8.3. Disaster Recovery Plan 26

8.4. Log sheet 27

9. User training and Awareness 28

9.1. User training 28

9.1.1. Policy statement 28

9.1.2. Scope 28

9.1.3. Controls 28

9.2. User awareness 28

9.2.1. Responding to Security Incidents and Malfunctions 28

9.2.2. Policy Statement 28

9.2.3. Scope 28

9.2.4. Controls 29

9.3. Compliance 29

9.3.1. Compliance with Legal Requirements 29

9.3.2. Acceptable use and Enforcement 30

10. Quality Assurance Regime 30

10.1. Review of Information Security Policy 30

10.1.1. Policy Statement 30

10.1.2. Controls 30

10.2. Inspection 30

10.3. Audits 31

10.3.1. Policy Statement 31

10.3.2. Controls 31

10.4. Testing 31

11. Reference 32

12. Coursework Submission Form 33

System Objectives

Purpose

This document contains the security assurance plan formulated for Sirius Council Borough of Betelgeuse. The Purpose of this report is to define security requirements and policy to mitigate the risks and eliminate threats. This document contains policies and guidelines for various departments across the council. This document highlights all the assets and their owners in Sirius Council Borough of Betelgeuse. Assets are identified on the basis of criteria such as confidentiality, integrity and availability. This document elaborates the risk involved and security threats to these assets and the treatment plan. This document also explains the steps to be taken for business continuity, disaster recovery, training and quality assurance.

Information security

Every asset has some information about the council. Information security is about safeguarding all the information owned by the Council. Information is the heart of every Council, because of its value it is exposed to various security threats and vulnerabilities. A security threat can be malicious software, Virus, Trojan, information leakage by staff, data corruption, system failure, unauthorised access etc. For securing this information from the security threats the policies and the guidelines should be reviewed based on the requirements. To keep the information secure from the security threats is information security.

Information Lifecycle and Classification

The council handles information about its business, resource, employees, suppliers and citizen which is the most valuable asset. To create an information life cycle we have to identify assets and classify them in categories. Importance to the asset is given on the basis of Confidentiality, Integrity and Availability properties of the asset. Based on the importance given to the asset; the security level of the asset is decided. Information can be classified at different levels. Few types of information levels:

Personal

Important

Secret

Top Secret

Address Only

Cosmic Top Secret

An information asset can be either logical or physical. Following are the list of assets found in the council.

Information assets (Physical)

PCs

Routers

Servers

Document Image Processors

Phones, etc

Information Assets (Logical)

Databases

Software

Personal records

Email

Training materials, etc

Note: The list of all the assets can be found in the attached Gokulanathan Murthy (7514338).xls file

Relevant Topics for Compliance

This section lists the important regulations and standards that are followed across the Council to conduct an information security compliance assessment.

Regulations

The Council employees should be in compliance with the following regulations as mentioned in ISO/IEC 27001:2005

Data Protection Act

Freedom of Information Act

Council’s record protection

Communication Act

Computer Misuse Act

The Privacy and Electronic Communication Regulations

Standards

Standard assures system’s security from all threats. Sirius Council Borough of Betelgeuse and its staff should comply with the following standards

Information Security Management (ISO/IEC 27002:2005, ISO 17799)

Quality Assurance (ISO 9001)

Risk Management Guide for Information Technology Systems (NIST 800-30)

Responsibilities and Excepted Characteristics of Stakeholders and Users

Every stakeholders and users has certain responsibility in this System assurance plan. Use of technology doesn’t guarantee security for the system, to make the systems more secure the council should define the responsibilities and guidelines that are to be followed by its stakeholders and users. Regular checks should be made to make sure the guidelines are been followed by the stakeholders and the users.

Human Resources Manager

HR Manager is responsible for the employees recruited during their tenure. HR Manager should check the background of the employee before recruiting them. Each employee should know their limitation in accessing certain resource about the council. HR manager are responsible for providing the required resource for the employees and should make sure that employees follow the guidelines.

Security Manager

Security Manager and his team are responsible for developing security measures across the council. Security Manager should make sure that their security policy reaches to all the departments and they follow it. The restricted section in the council should be accessed only by the authorised personal; their identity should be verified by the security management team before giving accesses to them.

Line of Business Manager

All the documents and report of the council are maintained by the Line of Business Management department. They are responsible to backup the important documents and should ensure proper security to the files. Updates made to the file should be made in the backup file also and authorisation to access those files should be made at the time of creating the file.

Operations Manager

Operation Manager is responsible for the reviewing the agreement with the external suppliers and should make sure the business continuity. He is also responsible to make backup plans when the external suppliers are not able to provide service to the council.

Network Manager

The Network Manager and his team are responsible for the network and they ensure that the network is secured from external and internal attack. Network is secured in such a way that the performance of the system is not compromised. The backup plan is formulated by the network management team, and the antivirus and the firewall are kept up-to-date to face the threat which grows every day.

IT Manager

IT Manager is responsible for the IT infrastructure of the council. Access to the systems by the employees is defined by the IT Manager. The integrity of the system and the files has to be maintained by the IT Manager, his responsibility is to safeguard the system from threats and stop the misuse of the system utilities.

Voice Service Manager

Voice Service Management team is responsible for the voice network across the council. To measure the quality of the call, each call is recorded. Stored voice data should be protected from unauthorised access.

Database Administrator

The Sirius Council Borough of Betelgeuse functions on the information they possess. The Database Administrator is responsible for storing and securing the data. DB Administrator must ensure the integrity of the data entered and should secure it from unauthorised access, data corruption, virus attack, etc. DB Administrator has the right to provide data access to the employees.

Employees

Employees are the major part of the council, they are expected to follow all the security policies and handle the asset with care. If any condition goes out of their hand, they are expected to report to their higher officials.

Protection Profile

Information possessed by the council should be protected from threats and the priority to the asset should be based on the information sensitivity. Information must have a back up in a remote location. Security measures for information systems such as Antivirus software, firewall, should be installed and regularly updated. Access to sensitive areas in the council should be restricted to unauthorised persons and it should be monitored by surveillance videos, CCTV cameras should be installed in sensitive areas to monitor the threat from external and internal threats.

Asset Register

Please refer Gokulanathan Murthy (7514338).xls file for the list of assets assessed as part of the plan for Information assurance plan

The three steps in asset register are

Asset Identification

Assigning asset ownership

Asset Classification

Asset Identification

Asset identification helps us to understand the important resource for the business, and protection to the asset can be decided on the sensitivity it brings to the Sirius Council Borough of Betelgeuse. The asset that brings the highest value to the council is given the highest priority and it is secured.

Asset Ownership

Every asset will have an owner; the owner is accountable for the asset. In a department the department head will be the owner of the asset used by that department. Owner is identified based on their association with the asset.

Asset Classification

Assets can be broadly categorised in the following manner:

Electronic information assets

Core IT equipment

Paper based assets

Software assets

People

Support service/Equipment

Information Classification and Accountability of Assets

All the council information is considered propriety and will be protected from unauthorised access or disclosure commensurate with its sensitivity. Classification and associated protective controls for the asset shall be determined by business needs for sharing or restricting information. Risk analysis of all the assets shall be conducted to assess the security vulnerability and effectiveness of existing controls.

Information Labelling and Handling

Sensitive information of the council should be protected against disclosure to individuals who do not have a need for such information. Information shall be labelled and handled in accordance with the classification scheme adopted by the Council. Information Copying, distribution, storage and disposal should be in accordance with the classification scheme adopted by the council.

Software Licensing, Purchase and Insurance

Legal compliance, ongoing vendor support and protection against piracy should be ensured. A separate log should be used to keep a track about the license of the software. Purchasing resources shall be carried out in accordance with well-defined and documented steps to ensure that the business, technical and security requirements behind all such purchases are met. All the council resources, data and associated hardware should be protected against theft, damage, lost, etc.

Server hosting policy

Servers shall be hosted as per-defined criteria

ASP services shall be selected as per a pre-defined set of criteria

Risk Assessment

Please refer Gokulanathan Murthy (7514338).xls file for the lists of risk and its impact strategy as a part of the plan for Information assurance plan.

Risk Treatment and Countermeasures

Please refer Gokulanathan Murthy (7514338).xls file for the Risk treatment and Countermeasures.

Countermeasure: Steps taken to counteract a threat and mitigate the risk.

Listed below are the threats faced by the council’s assets and their categories taken from http://msdn.microsoft.com/en-us/library/aa302418.aspx

Category

Threats

Authentication

Misusing others access controls

Cookie replay

Password hacking

Network eavesdropping

Authorisation

Elevation of privilege

Disclosure of confidential data

Data tampering

Configuration Management

Unauthorised access to management interface

Unauthorised access to administration files

Over privileged service account

Session Management

Man in the middle

Session hijacking

Session replay

Cryptography

Poor key generation

Weak encryption

Exception Management

Information disclosure

Denial of service

Auditing and Logging

User denies performing an operation

Attacker covers his or her tracks

Attacker exploits an application without trace

The following section will discuss the threats and their countermeasures in detail.

Application Threats and Countermeasures

Application faces threats from the hackers/crackers who try to get access of the application and steal information from the application. And sometimes threats faced by application are that the hacker alters the data that is sent between application and thus inducing error in the application [1].

The application threats and their countermeasures are as follows:

Spoofing

Attempt to gain unauthorised access to the system by using a false identity. The asset in the system are at high risk if an attacker gains access to the system.

Tampering

Man in the middle attack will try to modify the data that we send through the network. While transmitting files through a network it is vulnerable.

Information disclosure

Information disclosure by the employees may be intentional or unintentional. Some examples include comment on a webpage which have link to the database, weak exception handling. This information can be used by the hacker to gain information about the database location and other information.

Denial of Service

Making the system unavailable or making the service unavailable is DoS. A Denial of Service consumes all the resource thus crashing the whole application.

Elevation of privilege

User with limited privilege tries to gain access to control a account that they are not allowed access to.

Policy Statement

Use tools to detect the integrity of the application, use third part to validate the application.

Countermeasures

Use strong authentication

Do not pass credentials in plain text over wire

Protect authentication cookies with SSL

Digital signatures, data hashing, authentication

Use strong encryption and decryption technique

Don’t write the password on desk, don’t keep the system running when work is completed

Use resource and bandwidth throttling techniques

Data logger should be used to monitor the input given by the users

Give the employees with least privilege, once confidence in the employee grows and the need of the hour demands access for the employee then provide access to high privileged systems.

Network Threats and Countermeasures

The devices that make up a network infrastructure are routers, firewalls, and switches. Vulnerabilities in the infrastructure will be targeted by the attacker, such as weak installation settings, missing security patch. The network threats faced and the appropriate countermeasure techniques used for them are as follows:

Information Gathering

Open ports are the gateway for the attackers; they scan the port to see if any port is open. Once the attacker enters the port he gathers information and attacks network which is vulnerable.

Sniffing

Sniffing is the process of monitoring the network traffic for data such as password. Attacker can also crack the packets and can decipher payload.

Spoofing

Spoofing is a technique of hiding one's true identity on the network and hide the address of the attacker. Carefully spoofed packet may never be tracked back.

Denial of Service

Making the network inactive or making the service unavailable is DoS. A Denial of Service consumes all the resource thus crashing the whole network.

Policy Statement

Use firewalls and update and apply patches to it regularly. UPS should be available at times of power failure in the network

Countermeasures

Configure routers requests.

Use firewall to protect network against denial of service

Network should be adequately managed and controlled 

Special controls for confidentiality and integrity over public networks 

Information in network should be secure

Systems and applications connected to the network should be securely  maintained 

Procedures for management of remote equipment must be established 

Special controls for availability of network services 

Operational Responsibility for networks must be separate

Proper segmentation and physical security can prevent DoS

Use encryption technique for communication, including authentication credentials

Filter packets that appear to come from an invalid local IP address.

Apply the latest patches.

Use a network Intrusion Detection System (IDS) use to detect and respond to SYN attacks.

Software Threats and Countermeasures

These threats affect the system software upon which the application are built

Viruses, Trojan horses, and worms

Foot printing

Expiring licence

Profiling

Password cracking

Denial of service

Policy Statement

Install antivirus on each workstation and make sure they are updated regularly. Authentication must be checked before providing permission for any user to use particular software.

Countermeasures

Stay updated with the latest operating system upgrades and software patches.

Disable unnecessary protocols.

Buy new licence before the old licence ends

Lock down ports with appropriate firewall configuration.

Use strong passwords for all account types.

While Configuring applications, servers, and operating system keep denial of service in mind.

Ensure the application is capable of handling high volumes of traffic

Ensure high load can be handled effectively.

Review the application's fail-over functionality.

Information Security policy

Policy Statement

To establish rules to manage information security within the council

Countermeasures

Security committees shall be formed to ensure that management support for security initiatives

Information security committees should comprise members from all department which will coordinate the implementation of information security controls

Authorisation and responsibilities of individuals should be clearly defined

Independent review of information security policy should be done from time to time

Important data and information file should me moved to a remote site, backup should be done regularly

Access control Policy

Policy Statement

Access rights of all employees, third party to information asset should be provided based on the role they play in the Council.

Countermeasures

Server room access should be given access to responsible department; access to the room should be given using biometric, Iris detection etc.

Unauthorised access by any employee should be investigated thoroughly

Such access control should be implemented for all applications and software also.

Access control to the systems should be password protected and should be changed periodically

Mechanism should be put in place to ensure a secure password is selected by the employees

Review the access control periodically and changes should be made

Sensitive systems should have a separate location where only authorised persons can enter.

Email & Internet Usage

Policy Statement

Audits for the number of mails sent and received will be done on regular basis to discourage unofficial mails. The objective is to protect information from leaked via email and internet.

Countermeasures

Housekeeping of your inbox and outbox

Give Training for the employees to segregate mails

Any logs not confirming to company policy or not in line with companies interest would be bought to attention of their respective managers and disciplinary action should be initiated.

Use encryption and decryption technique for all mails.

Employees should comply with the copyright, fair usage and license agreements

Internet usage on council premises shall be in accordance with pre-defined criteria.

Data management

Policy Statement

To establish procedures to store the data and make it available when it is needed. Procedures should be reviewed periodically and updated.

Countermeasures

Have security inspection to check the integrity of storage area.

Access should be allowed through the use of swipe cards, biometrics etc.

Store the data in the database using encryption and decode it while retrieving the information

Data should not be shared with others without the permission of the owner of the data

Disciplinary actions must be in place abiding to Data Protection Act 1998

Data backup should be made in a remote site

Personal Security Policy

Policy Statement

Personal security controls will ensure that users granted access to the Councils IT systems are appropriately screened, evaluated, and trained. The objective is to reduce human errors, theft, fraud or misuse of information asset

Countermeasures

Include the security roles and responsibilities in job responsibilities

Do character reference check, CV check, on all the council staffs at the time of job application

Employees should sign a confidentiality agreement as a part of terms and conditions

Controls and procedures shall ensure that all employees comply with security processes

Access card should be used to enter the council and each department should have access cards to access their asset.

Department concerned with transfer and termination cases should be notified in order to withdraw the accesses.

CCTV camera should be kept n place to monitor the council 24/7

Physical Security policy

Policy Statement

Physical protection for unauthorised access, physical damage is needed for the council’s information assets, peripherals, terminals and other related equipments.

Countermeasures

Site selection and constructions should be in accordance to the security guidelines

Selection of doors and windows should be in accordance with defined procedures

Cameras shall be used and monitored and images of people entry into the council shall be processed

Entry controls such as swipe card, IRIS detection should be used to secure a area in the council, so that only authorised personal are allowed access

Fire fighting equipments, Fire exit, and smoke/fire sensors should be placed at appropriate place and evacuation drills should be done periodically.

Equipment Security Policy

Policy Statement

To establish rules to prevent loss, unauthorised access, theft of data from the councils equipments that are used to process the information assets.

Countermeasures

Equipment shall be sited in a manner that reduces the risk from natural disaster and unauthorised access

Equipments shall be protected from power failures and other anomalies

Cables should be covered so that it protected from interception or damage

It should be maintained for continuous availability and integrity

To use the equipment outside premises shall require authorisation by security committee.

Information should be erased before disposal of the equipment

General Security policy

Policy Statement

To establish rules to prevent compromise or theft of information and information processing facilities

Countermeasures

A clear desk and clear screen policy should be implemented to reduce the risk of unauthorised access, loss of information

Equipment, information and software belonging to the Council shall not be removed without authorisation of the security committee.

Third Part Security policy

Policy Statement

Council partners will also have the same access restriction to which internal users would be subjected. They will be required to formally acknowledge their responsibility for confidentiality through a written statement.

Countermeasures

Partners to the council should be selected as per pre-defined criteria

Third part access to IT assets shall be based on formal service contract

All the contractors/consultant shall be required to sign a non-disclosure agreement

Business continuity

Business continuity ensures the continuous operation of its business processes and the services it offers. Unplanned events or interruptions such as natural disaster, System malfunctioning, absence of key employee may halt the council operations. A business continuity plan ensures the business continuity by planning necessary backups for the resource and the assets at a remote site.

Purpose

Procedures to be carried out in the Sirius Council Borough of Betelgeuse during various disasters.

Assign the responsibility for various groups in different cases of disasters.

Business Continuity Objectives

Before a disaster event

Reducing dependence on key personnel

Improving documentation

Decreasing potential threats and exposures

Lowering the possibility of a disaster event

During a disaster event

Avoiding disruptions to essential operations

Protecting employees and users

Safeguarding critical assets

Minimizing confusion and delays

After a disaster event

Reducing financial loss

Decreasing potential legal liability

Ensuring council stability and an orderly recovery

Adhering to legal, statutory and regulatory requirements

Business Impact Analysis

BIA covers the impact of business due to malfunctioning of any asset at the council. The priority of the assets is indentified and plans for continuity are made as per the analysis. BIA identifies the critical processes and their associated systems, application and technology. Analyse the impact of an outage, determine the recovery windows and recovery strategies.

Business Continuity Plan

Prioritisation

The assets are prioritised based on the sensitivity and the impact the assets bring to the council. The asset which enables continuous work flow is given more priority. During any disaster the assets based on its priority level should be restored within the specified time. Importance should be given to the asset with highest priority.

The BCP for the Sirius Council Borough of Betelgeuse is listed below

S.No

Assets

Priority

Impact

Alternative plan

Restore within

Relocation? (Can it be carried out elsewhere)

1.

Information Systems

High

Loss of data

Restore the crashed systems, use data from remote site

3 hours

No

2.

Software:OS, Antivirus, firewall

High

Crash/license expires

Try to fix or Re install

5 hours

No

3.

Mainframes

High

Crash/ loss of data

Restore the crashed systems, use data from remote site

2 hour

No

4.

Servers

Critical

Overload, breakdown

Try to retrieve data from the server. Use secondary servers till new servers are installed

1 hour

No

5.

Data Warehouse

Medium

Crash/ Loss of data

Restore the crashed systems, use data from remote site

1 day

No

6.

Customer services

Medium

Service terminated

Redirect calls to other location

2 hours

Yes

7.

Communication devices: Routers, modem Cables

High

Physical damage, Malfunctioning

Repair or replace with secondary cables

2 hours

No

8.

Voice network

High

Connection failure

Get service from secondary service provider

4 hours

No

9.

Data network

Critical

Network failure

Get service from secondary service provider

2 hour

No

10.

LAN/WAN

High

Network failure

Use different channel to communicate (ex: ISDN)

1 day

No

11.

Email

Medium

Crash/overloaded

Restore back to previous state, use information from back up sites to reply to queries in other form (telephone)

2 days

No

12.

Reporting tools

High

Crash

Try to fix or Re install

3 hours

No

13.

Staffs

Medium

Unavailability

Use temporary staff from the resource available until new recruitment is done.

2 days

No

14.

Power

Critical

Power failure

UPS backup should be activated once power failure occurs

2 hours

No

15.

Office buildings

High

Physical Damage

Alternate location

2 days

Yes

Contacts

The name and the contact details of the members involved in the BCP should be made available to all the employees

Department/Team

Contact Person (s) name

Phone no

Additional information about responsibilities

Central IT Team

XYZ

111

PCs, Applications, Network devices.

Supplier’s details shall also be made available for the employees. In case of emergency suppliers can be contacted to rectify the errors

Company Name

Contact No

Email

Additional information about product/ licensing details

AVG

000

[email protected]

License expires on 12/07/10

Incident Management

Incident management ensures the orderly response to the incident occurred and the steps to pacify the result of the incident. Examples of incidents are Application error, Server down, Service not available, Denial of service.

Incident Identification

The admin should have a close look at the incident and should find the risk that matches the incident, if not look for a similar incident and match the risk associated of that incident to the new incident. The process of the affected business part should be closely monitored and managers should be ready to brief the incident to the management.

Incident Classification

Incidents can be classified based on the intensity of the incident; it is classified into two categories:

Major Incidents

When the impact of the incidents spreads across the council infection more systems and hence bringing the process to a halt. Ex: Virus, worm, Trojan attack.

Minor Incidents

Minor incidents don’t affect the business continuity. The impact of the incident is limited to single department or a small group of systems. Ex: Service not available.

Incident Response

Any suspicious incident will be reported to the Incident Response team (IRT), the responsibilities if IRT is to analyse the incident and should take the issue to the department which is involved. The IRT keeps a close look on the progress of the business unit which is affected. The report should contain Description, cause for the incident, Damages observed, steps taken to pacify the incident. Warnings should be sent to similar department which may also be affected by the similar incident.

Incident Recovery

It is the process of eliminating the causes of the incident and brings back the system and the process to normal. This involves implying security measures to tackle the incident and reconfigure the system in such a way that the incident never happens again. Once the recovery from the incident is done the affected portion should be monitored to find out the effectiveness of the implied security measures.

Incident Prevention

After the incident the IRT should make sure that all the operations are back to normal and the involved team should be informed about the termination of the incident. People involved in tackling the incident to bring the process to normal should be informed about their work and given incentives. Review the way the incident was handled and search for any better methods which would have been used, if there is any better method document it for future purpose.

Response and Recovery Checklist

Use this checklist for the steps to be taken during emergency

Preparation Phase

Establish a building evacuation plan

Post the names of the department/supervisor to which the employees should report at the time of incident

Keep track of the changes made to the network

Regularly update the resource available and information added being added to it.

Maintain contact information of the employee and regularly update it

Maintain a list of all vendors/customers/shareholders and their scheduled delivery dates.

Store resource at remote site and make sure the response team members know where it is.

Response Phase

Determine the nature and extent of the emergency.

Inform employees in the building/department of the emergency.

Make sure all the trace of the incident is totally removed.

Contact other location and inform them about the situation.

Contact your vendors/customers/share holders

Make sure security is in place.

Activate your Disaster Recovery plan.

Log Sheet

The log sheet must be used to record the actions taken during the emergency time.

Date

Time

Action taken

Person Responsible

Audits

Audits should be conducted regularly to ensure the validity and relevance of the business process. The audits should be made internally and also by the third party and the criteria for the audit should be set by the council.

All the methods and processes mentioned in the business continuity plan should be implemented

Test the councils ability to handle a incident

All the action taken by the incident response team during the incident is recorded and reviewed by the audit team

Review the BCP and update it as per the need of the day

From the audit results changes are made in the concern department to make the system more secure

Testing the BCP

Test the BCP to find whether all angles have been covered and whether the plan is achievable

Check whether the third part involved in the BCP are ready to respond

Measure the time required to run the backup systems

Check whether the BCP are realistic and can it be put in place in expected timescale

Check the validity of the backup data and check for updates in the backup data

Test the employees how they react during a emergency period

Drills to be done bi-annually as per plan

Lessons learnt to be fed accordingly to the BCP to roll out next version

Disaster Recovery

Disaster recovery is the steps to be taken to restore the council’s operations after a disaster. Disaster can be as a result of hacker attack, malicious software, natural disaster, unauthorised access of council’s data, etc.

Emergency Response during disaster

Activate the Disaster Recovery Team to implement the disaster recovery plan

Make sure all the employees assemble outside the building (in case of earthquake, fire), it can be Civic centre parking area

When there is a disaster Emergency Response Team should be called and they should measure the intensity of the disaster and should assign Disaster Recovery Team for each case

All the staffs members should know how to contact their Disaster Recovery Team

Decide on which Disaster plan can be implemented for the disaster

Disaster Recovery Team

The disaster recovery team is formed by the members from different department. Each department will have a member in the team, so that taking decision for each department will be quick and precise. The aim of the team is to implement the disaster recovery plan and restore the functions of the council. The team should restore the lost asset and ensure the continuous operation. The duties of the disaster recovery team are:

Prepare a quick report about the disaster

Analyse the situation and check whether any asset can be saved from further disaster

Test if the business continuity plan can be carried on without any blockage

Split the work among the team based on the specialisation of the members

Establish a emergency service within 2 hours to notify the clients/shareholders about the work done for the restoration of service

Restore key services within 4 hours of the incident

Identify the root cause and try to reduce the impact

Work with the owner of the asset to learn more about the asset and its impact on the council

Assets should be given priorities based on the intensity of the damage and its impact on business

Mock drills should be performed after the recovery from disaster

Document the proceeding and review the steps taken and if necessary do changes to it.

Risk assessment should be done once a year

Training for the employees about how to act at times of disaster

Record all the actions and log it for future reference

Measure the cost of the impact to claim insurance

Disaster Recovery Plan

Disaster Recovery Plan (DRP) lists the key asset that needs to be restored or recovered after a disaster. DRP ensures the stability of the process and the integrity of the system used. The DRP should be stored in a remote location; the plan should be assessable at times of disaster. The table below highlights the key assets of the council and the ways to recover it.

Asset

Impact Rating

Department Responsible

Contact Person (s)

Recovery Plan

Recovery Time

Information Systems

1

IT Department

Mr. ABC

Replace the affected system/ Upgrade

1 - 2 Hours

Software: OS, Antivirus, firewall

1

IT Department

Mr. ABC

Reinstall

1 - 2 Hours

Mainframes

2

IT Department

Mr. ABC

Backup/ Remote location storage

1 days

Documents Financial, strategy

2

Management Team

Mr. ABC

Backup/ Revise it

1day

Servers

1

Networking Team

Mr. ABC

Secondary backup servers

1 day

Public kiosk

3

IT

Mr. ABC

Replace it

3 days

Data Warehouse

2

Database admin

Mr. ABC

Backup in remote location

1 day

Email

2

IT Department

Mr. ABC

Reconfigure, Secondary servers

1 day

Cables, Routers, Modem

3

IT

Mr. ABC

Replace it

1 day

Networks: LAN, WAN, Data, Voice

1

Network department

Mr. ABC

Alternative connection

4 - 6 Hours

Staffs

2

HR Department

Mr. ABC

Replacement/ temporary resource

2 days

Reporting Tools

2

IT Department

Mr. ABC

Reinstall

5 hours

Power

3

IT Department

Mr. ABC

UPS backup

4 - 6 hours

Office buildings

3

Security Department

Mr. ABC

Alternate location

2 days

Customer services

2

IT Department

Mr. ABC

Alternate Location

2 days

Impact: 1=Major impact, 5=Minor impact

Log sheet

The log sheet must be used to record the actions taken during the Recovery time

Date

Time

Disaster type

Action taken

Person responsible

User training and Awareness

Growth in technology has resulted in fast processing and accuracy, illiteracy in use of those new technologies may breach the security code. It is the council’s responsibility to provide training to the council employees. Training brings the awareness among the employees about the threats and vulnerabilities to the information they possess. They become aware about the policies and controls they have to follow

User training

Policy statement

All the users of the council systems should be provided training with regards to Sirius Council’s policies, standards and guidelines to ensure that users are aware of the security threats that the assets face and to ensure that the employees are equipped to support Sirius Council Borough of Betelgeuse Information Security policy when there is any attack on these assets.

Scope

This policy shall apply to all the Council associates, and all information assets in the custody of respective owners, including client data, software, application, storage, access and distribution to users both internally and external.

Controls

Information security Education and Training

All employees of the council and, where relevant, third party users shall receive appropriate training and regular updates in councils policies and procedures.

User awareness

Responding to Security Incidents and Malfunctions

User should be aware of the council’s policies, standards and guidelines, awareness by experience will give the employees confidence to face any problems. Each employee should be aware about how they should respond to an incident

Policy Statement

Establish rules to make the employees aware of the threat and provide them opportunity to learn from the past experience.

Scope

This policy shall apply to all the Council associates, and all information assets in the custody of respective owners, including client data, software, application, storage, access and distribution to users both internally and external.

Controls

Reporting of Security Incidents/weaknesses/Malfunctions

The user of the asset should be able to note and report any suspected security incidents/security weaknesses/software malfunctions through appropriate management channels as quickly as possible.

Learning from incidents

Where there is an attack on the asset, employees can refer to similar type of attack on the asset. Countermeasures for the attack can be taken from the previous experience of handling the attack.

Disciplinary Process

Disciplinary actions should be taken against the employee who doesn’t comply with the policies and controls.

Compliance

Compliance with Legal Requirements

Policy Statement

Establish rules to teach the employees about the legal obligation they have to follow while working in the council.

Controls

Identification of Applicable Legislation

All the legal obligation and requirements for using the information system should be made available to the employees. All the requirements, regulatory should be documented and made available to everyone who are using the system.

Intellectual Property Rights

Legal restriction on the use of propriety software products and other material shall be complied with.

Safeguarding of Council Records

Important records of the Sirius Council Borough of Betelgeuse should be protected from unauthorised access, theft, destruction and duplication.

Prevention of Misuse of Council Information Processing Facilities

Council security committee shall authorise the use of information processing facilities and controls shall be applied to prevent the misuse of such facilities.

Collection of Evidence

When legal action is taken against an employee the evidence submitted to the court should conform to the rules of the council. Sensitive information cannot be presented in the court. If the need of the situation demands sensitive information, then higher management should be consulted. Log all the activities of an employee so that it acts as evidence.

Acceptable use and Enforcement

With all the policy, controls and guidelines the employees should be given training about the use of the asset they handle. Training materials, manuals should be made available to all the employees of the council. Any update in the policy/guidelines should be made available to the employees. Third part involved with the council should sign a agreement where the policy and controls should be mentioned.

Employees must be aware of the level of authorisation they have to the asset. All the employees and staffs working in the council should sign a policy declaration form at the joining time. Any violation by the employee will face disciplinary action according to the law of books. Serious offence may result in termination from the council and legal action will be taken.

Quality Assurance Regime

Quality assurance is required to assess the business plan of the council. Quality assurance regime is required for the council to provide service with high standards. Quality should be improved in the security policies, procedures, processes and controls. So regularly updates, reviews, audits, testing should be made to maintain a level of quality standard.

Review of Information Security Policy

Policy Statement

Establish rules to ensure compliance of system with Council security policies.

Controls

Compliance with Information Security Policy

Reviews should be made quarterly and updates should be amended to the information assurance plan. Review should have certain criteria so that the effectiveness of the policy is tested and necessary changes can be made. The review should test the technical, standards and usability of the system. Whenever there is an introduction of new technology to the council, the review team should review the new system and their feedback should be available for the department working with the new technology. All the reviews and feedback should be documented for future reference.

Technical Compliance Checking

System should be checked regularly for compliance with security implication standards. Obsolete systems should be replaced and the software’s should be updated regularly.

Inspection

Inspection should be done periodically in random departments. Inspection should be done without any prior notice. The aim of inspection is to find out the negligence of the employees in following any standards/policy. Inspection team should be formed by one staff from each department. After each inspection a detailed report should be submitted by the team to the management. All the report and the proceedings should be recorded.

Audits

Policy Statement

To establish rules to maximise the effectiveness of the security policy, and to find ways for improvement. Audits will be conducted to

Ensure integrity, confidentiality and availability if information and resources

Investigate possible security incidents

Ensure conformance to Sirius Council Borough of Betelgeuse security policy

Monitor user or system activity where appropriate

Controls

System Audit Controls

Audits should be made in such a way that it doesn’t affect the performance or halt the process. Audits can be done when the workload is less or during holidays.

Protection of System Audit Tools

Access of system audit tools to employees who doesn’t have access should be protected to prevent any possible misuse or compromise.

Testing

Each department should have a team to test the platform and the process. The team should use tools like nmap, X-scan, Nagios to test their network. System should be scanned with antivirus to detect virus, spyware, malwares and other vulnerabilities. Mock test should be done for the Business continuity plan and the Disaster recovery plan to make sure that they are up-to-date. Mitigate/eliminate the vulnerabilities which are associated to the asset. Testing should be done regularly and also when a new system or technology is introduced in the council. Test should be made on new technology to make sure it does the required job without any error.

Penetration testing should be done to test the vulnerability present for the hacker /cracker to destroy/steal information. The testing should be done by someone who knows about hacking/cracking. Third part penetration testing can also be done to find out vulnerabilities. Once any vulnerability is found the system administrator and the owner of the asset is informed to do the changes to make the system secure. The intent of penetration testing is to find out the business impact if such an attack occurs.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now