Governance Info-Assurance Cyber-Security
Governance Info-Assurance Cyber-Security
2 | Table of Contents
6.7 Reduce Single Point of Failure .......................................................................................................................................................38
6.8 Demonstrate Compliance ................................................................................................................................................................38
6.9 Increase Efficiency and Productivity ............................................................................................................................................39
6.10 Cyber Security Controls Branch (CSCB) ....................................................................................................................................40
6.11 Compliance, Auditing, and Policy Branch (CAPB) ...................................................................................................................40
6.12 Identity and Access Management Branch (IAMB) .................................................................................................................40
6.12.1 Public Key Infrastructure-Certificate Management Services (PKI-CMS) ............................................................41
6.13 Security Operations Monitoring Branch (SOMB) ....................................................................................................................42
6.13.1 Deliver Situational Awareness .......................................................................................................................................42
6.13.2 Meet Business Operations Requirements ...................................................................................................................42
6.13.3 Reduce Risk and Downtime .............................................................................................................................................42
6.13.4 Threat Control and Prevention ........................................................................................................................................43
6.13.5 Ease Administrative Overhead ........................................................................................................................................43
6.13.6 People and Responsibilities .............................................................................................................................................43
6.13.7 Escalation Path ...................................................................................................................................................................43
6.13.8 Audit and Compliance Support .......................................................................................................................................43
6.13.9 Incident Response and Recovery ..................................................................................................................................44
6.13.10 Meet Technical Operations Requirements ................................................................................................................44
6.13.11 Speed of Aggregation and Correlation .......................................................................................................................44
6.13.12 Device and System Coverage .......................................................................................................................................44
6.13.13 Proactive Infrastructure Monitoring ............................................................................................................................44
6.13.14 Uptime 24/7, 365 Days of the Year .................................................................................................................................44
6.13.15 Support for Federated and Distributed Environments .............................................................................................44
6.13.16 Forensic Capabilities .......................................................................................................................................................44
6.13.17 Intelligent Integration with SOCs and NOCs ..............................................................................................................45
6.13.18 The SOC in Action ............................................................................................................................................................45
6.13.19 Multiple Security Operations Centers .........................................................................................................................46
6.13.20 Privileged Access Monitoring .......................................................................................................................................46
6.14 State of Hawai`i Data Privacy Program .....................................................................................................................................46
7 STRATEGIC PLAN ASSUMPTIONS ........................................................................................................................................................47
8 CONSTRAINTS ............................................................................................................................................................................................48
9 INFORMATION ASSURANCE AND CYBER SECURITY INITIATIVES ..............................................................................................49
10 GUIDANCE FOR PROGRAM MANAGERS AND PROJECT LEADS .................................................................................................49
11 CONCLUDING REMARKS .......................................................................................................................................................................50
APPENDIX A - INFORMATION ASSURANCE AND CYBER SECURITY PROGRAM
STRATEGIC INVESTMENT INITIATIVES ...................................................................................................................................................51
CONTRIBUTORS ............................................................................................................................................................................................51
SOURCES .........................................................................................................................................................................................................51
Table of Contents | 3
FIGURES
Figure 1 - CIO’s IT/IRM Transformation Vision ........................................................................................................................................ 11
Figure 2 - Security Life Cycle ...................................................................................................................................................................... 14
Figure 3 - Risk Management Cycle ............................................................................................................................................................16
Figure 4 - Impact Assessment of Various Incidents to Enterprise ......................................................................................................20
Figure 5 - Elements of Information Assurance and Cyber Security (Parkerian Hexad) .................................................................24
Figure 6 - Security Implementation Strategy Based on Importance vs. Complexity ......................................................................25
Figure 7 - Information Assurance and Cyber Security Capability Maturity Model with Example Security Controls ..............28
Figure 8 - Information Assurance Branch Roadmap .............................................................................................................................29
Figure 9 - CIO Top Information Assurance and Cyber Security Concerns (2011) ............................................................................33
Figure 10 - Recommended Information Assurance and Cyber Security Division Organization ...................................................39
Figure 11 - Notional Shared Services Center Vision for Hawai`i ........................................................................................................46
4 | Table of Contents
TABLES
Table 1 - Security Controls Classes, Families, and Identifiers .............................................................................................................15
Table 2 - Identified Risks ..............................................................................................................................................................................18
Table 3 - Differences in Methodologies ....................................................................................................................................................19
Table 4- Impact/Likelihood of Impact to the Enterprise Matrix ...........................................................................................................19
Table 5 - Factors in Risk Analysis Equation ..............................................................................................................................................21
Table 6 - Example Risk Analysis Table .......................................................................................................................................................21
Table 7 - CISSP 10 Domains of Information Assurance ........................................................................................................................23
Table 8 - Categories of Security Controls Related to Information Assurance .................................................................................26
Table 9 - Maturity Levels of Security Controls Related to Information Assurance .........................................................................26
Table 10 - IA and CS Staff Distribution of Full-time Equivalents ..........................................................................................................26
Table 11 - Description of Investment Initiatives Tables .........................................................................................................................53
Table of Contents | 5
1 EXECUTIVE SUMMARY
6 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
1 EXECUTIVE SUMMARY
In 2010, the Office of the Governor introduced a New Day The Plan includes initiative and project recommendations that
Plan designed to take a fresh look at many of State’s most specifically focus on enhancements and advancements that
significant investments with the aim of enhancing efficiency address specific security needs and establish a long-term
and effectiveness in key areas. The Information Technology (three-to-five year) strategic direction for the Information
(IT) program was an investment focused on early in the new Assurance (IA) and Cyber Security (CS) Program.
administration. The State’s IT program supports a complex,
diverse, and multifaceted mission and has been identified As noted earlier, the strategy outlined in this Plan is a
as requiring enhancements to its IT security component. In companion document meant to complement the Office of
recognition of the need to provide these enhancements, the Information Management and Technology’s (OIMT’s) IT/
State’s IT management has undertaken efforts to address IRM Transformation Architecture. The IA and CS Strategic,
IT security and compliance areas that need enhancement Program Management, Continuity of Operations and Disaster
to provide the additional protection to sensitive State Recovery, Privacy, and Governance plans identify much of the
and personal information by refocusing its resources and foundational structure. The management roles, responsibilities,
reevaluating its goals. The result of this re-evaluation is and oversight functions; risk-management processes;
reflected in the following plans: Information Assurance compliance, security, and efficiency goals; and foundational
and Cyber Security Program Management, the Information program and project management processes necessary
Assurance and Cyber Security Strategic, Information to support the strategic direction and tactical efforts are
Assurance and Cyber Security Governance, Disaster identified in this Plan.
Recovery and Continuity of Government, and Privacy.
In preparing the Plan, the authors evaluated the current state
This document presents State’s Information Assurance and of IA and CS within the State at the department, division,
Cyber Security Strategic Plan supporting this initiative. and branch levels. Using legislated requirements, educational
Strategic plans covering all aspects of business, IT, and studies, industry and government best practices and planning
information resource management (IRM) have also been documents, department and organizational commitments and
developed and identified as Phase II transformation efforts. lines of business (LOBs), and the experience and knowledge
Although the projects and the strategy have been well vetted, of the team members to build a list of prioritized initiatives,
they are subject to change pending final approval of State’s IT a strategy was developed that will help to focus State’s
Governance Plan. technology efforts.
The Information Assurance and Cyber Security Strategic By adopting any of the initiative recommendations identified,
Plan, referred to as the Plan, has been prepared in response a significant improvement the State’s security posture will
to the Chief Information Officer Council (CIOC), Enterprise be achieved.
Leadership Council (ELC), and the Enterprise Architecture
All of the recommended initiatives represent significant
Advisory Working Group (EA-AWG) as a vital component
investments of both capital and human resources; however,
of the State of Hawai`i Business and IT/IRM Strategic
the benefits derived in implementing these initiatives greatly
Transformation Plan. The Plan is a direct result of briefings
outweigh the potential risks associated with damage to State’s
provided to the Chief Information Officer (CIO) addressing
reputation, mission activities, and public trust.
improvement of the Information Resources Management of
information assurance and cyber security within the State.
Under the leadership of the CIO, the Information Assurance
and Privacy Advisory Working Group (IA&P-AWG), hereafter
referred to as the authors, prepared this document. This Plan
recommends both a strategic and tactical approach to IT
security improvements using a risk management framework
that addresses current and future needs of the State’s
security posture while recognizing the technical, financial,
and cultural needs of State’s organizational subcomponents.
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 7
2 INTRODUCTION
8 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
2 INTRODUCTION
This Plan defines and prioritizes a number of IA and CS meanwhile, mobile, wireless, and cloud computing bring the
initiatives that the State must undertake to enhance the full power of the globally connected internet to a myriad of
protection of information. While referred to as a strategy, personal devices and critical infrastructure. Because of market
the Plan is more properly a list of strategic investments. In incentives, innovation in functionality is outpacing innovation
preparing the Plan, the authors have made a strong effort to in security, and neither the public nor private sector has been
consolidate previously identified projects (where practical), successful at fully implementing existing best practices.
provide scope and definition to each of the identified efforts,
identify the general risks addressed by the initiative, and The impact of this evolution is seen not only in the scope and
provide a foundation that can later be refined by formal nature of cyber security incidents, but also in the range of actors
project teams. In addition, to support a higher-level evaluation and targets. In the last year, we observed increased breadth
of which initiatives can be undertaken and when, the Plan and sophistication of computer network operations (CNOs) by
attempts to identify any significant dependencies associated both state and non-state actors. Our technical advancements
with the initiatives. in detection and attribution shed light on malicious activity, but
cyber intruders continue to explore new means to circumvent
defensive measures.
2.1 BACKGROUND
Among state actors, China and Russia are of particular concern.
The State’s various mission objectives, geographically diverse As indicated in the October 2011 biennial economic espionage
organizational structures, and many partnerships present report from the National Counterintelligence Executive,
unique technical challenges. The effectiveness of the techniques entities within these countries are responsible for extensive
currently employed within the departments to address risks illicit intrusions into U.S. computer networks and theft of U.S.
to information is inconsistent, and the use of the technologies intellectual property.
has not been used to maximum capabilities. Former IA and CS
programs and related management plans, strategies, processes, Non-state actors are also playing an increasing role in
and initiatives established a succession of progressively international and domestic politics using social media
elaborative IA and CS improvement tactics that built a sound technologies. We face a cyber-environment where emerging
foundation and established direction for the State’s IA and technologies are developed and implemented faster than
CS program. governments can keep pace, as illustrated by the failed efforts at
censoring social media during the 2011 Arab Spring revolutions
The approach in this Plan combines, defines, and prioritizes a in Tunisia, Egypt, and Libya. Hacker groups, such as Anonymous
list of multiple investments intended to consolidate all State and Lulz Security (LulzSec), have conducted distributed denial
departmental IT security initiatives into a shorter, more concise of service (DDoS) attacks and website defacements against the
list of key investment efforts. Although it is still not a short list, government and corporate interests they oppose. The well-
the remaining initiatives can be evaluated with other IT/IRM publicized intrusions into NASDAQ and International Monetary
program projects and available resources to decide which can Fund (IMF) networks underscore the vulnerability of key sectors
be realistically accomplished. The risk assessments outlined of the U.S. and global economy.
in this Plan can provide key IT, mission, and stakeholder
communities with an important decision-making tool when Hackers are also circumventing network security by
evaluating and documenting the risks associated with IA and CS targeting companies that produce security technologies,
projects that cannot or will not be completed. highlighting the challenges to securing online data in the face
of adaptable intruders. The compromise of U.S. and Dutch
This Plan builds heavily upon the development and deployment digital certificate issuers in 2011 represents a threat to one
of a multi-layered defense strategy: the Acceptable Risk of the most fundamental technologies used to secure online
Management (ARM) and the IT Certification and Security communications and sensitive transactions, such as online
Experts ISC2® Certified Information System Security banking. Hackers also accessed the corporate network of
Professional (CISSP) 10 Domains of Information Assurance.1 the computer security firm RSA in March 2011 and exfiltrated
data on the algorithms used in its authentication system.
2.2 CURRENT AND EMERGING CYBER SECURITY THREATS Subsequently, a U.S. defense contractor revealed that hackers
used the information obtained from RSA to access its network.
Cyber threats pose a critical national and economic security
concern due to the continued advances in—and growing
dependency on—the IT that underpins nearly all aspects
of modern society. Data collection, processing, storage,
and transmission capabilities are increasing exponentially;
1
International Information Systems Security Certification Consortium, “CISSP Domains, 2012.”
https://www.isc2.org/cissp-domains/default.aspx [1 May 2012]
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 9
2.2.1 OUTLOOK FOR 2013-2015 • Espionage by FIS. The U.S. Government reports that many
foreign countries are aggressive and successful purveyors
We assess that CNO is likely to increase in coming years. Two of of economic espionage against the U.S. Foreign Intelligence
the greatest strategic challenges regarding cyber threats are: Operations, including cyber capabilities, have dramatically
increased in depth and complexity in recent years. FIS will
1. The difficulty of providing timely, actionable warning of remain the top threat to the United States and state interests in
cyber threats and incidents, such as identifying past or present the coming years.
security breaches, definitively attributing them, and accurately
• Hacktivism (Hacker Activism). This is defined as “The activity
distinguishing between cyber espionage intrusions and
potentially disruptive cyber-attacks. of using computers to try to achieve social or political
change.”2 Hacktivist organizations accounted for 58 percent of
2. The highly complex vulnerabilities associated with the IT all data stolen in 2011.3
supply chain for networks.
• Cyber Cartels (aka Cyber Mafia). These large, dispersed
3. The increase of “Advanced Persistent Threats (APTs)” from organized cybercrime syndicates use sophisticated and
outside entities constitute a major challenge for information persistent attempts to gain access to private computer
assurance and cyber security professionals. APTs require a networks and systems to steal information for personal gains
high degree of stealthiness over a prolonged duration of (e.g., identity theft and blackmail).
operation in order to be successful. The attack objectives
therefore typically extend beyond immediate financial gain, Evolving business practices and IT will provide even more
and compromised systems continue to be of service even after opportunities for trusted insiders, hackers, and others to collect
key systems have been breached and initial goals reached. sensitive data. Corporate supply chains and financial networks
Implementation of proactive continuous monitoring of will increasingly rely on global links that can be exploited by
network perimeter, computer systems and infrastructure foreign collectors, and the growing use of cloud data processing
is therefore critical for the survivability of state services and storage may present new challenges to the security and
and citizen support. integrity of sensitive information.
2
Hacktivism, as defined in the Cambridge Business English Dictionary, 2011 Edition
3
“2012 Data Breach Investigations Report.” Verizon RISK Team, March 14, 2012. .http://www.verizonbusiness.com/resources/reports/rp_data-breach-
investigations-report-2012_en_xg.pdf?CMP=DMC-SMB_Z_ZZ_ZZ_Z_TV_N_Z037 [1 Jun. 2012]
10 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
2.4 ALIGNMENTS This Plan’s purpose is consolidation and prioritization of the
improvement initiatives for implementation and commitment.
This document aligns with and complements the IA and Using the Risk Management Framework in the IA and CS
CS Program Management Plan, materials presented to the Program Management Plan and associated governance, the
CIOC during recent briefings, departmental priorities, the processes will need to identify and accept residual risks as
Governor’s New Day Plan initiatives and priorities, and current needed where remaining gaps exist. The IT/IRM governance
legislation. Specifically, it is intended to align with the priorities processes will establish a set of those improvement initiatives
outlined in the Governor’s New Day Plan and the OIMT’s IT/IRM that State believes are within our resources to implement
Transformation Agenda pending legislative review and funding. and measure performance/success based on these. This
Plan will identify opportunities for increased efficiencies,
including specifying IA and CS services that are candidates for
enterprise solutions. This Plan will also attempt to identify gaps
in existing compliance functions, evaluate their related risks,
and incorporate prioritized improvement strategies and risk
reassessments into the Plan for continuous re-evaluation
of the strategy.
2.5 IA AND CS PROGRAM MANAGEMENT PLAN – First, contribute to both systemically improving security
controls over information and information systems (as
This Plan complements the new IA and CS Program informed by both departmental and OIMT evaluations and
Management Plan, which defines departmental IA and CS assessments) and that relate to improving those aspects that
program roles, responsibilities, and processes with respect adversely impact the ability to provide information in a reliable
to establishing IA and CS policy, standards, and operational/ and secure way to support any mission.
oversight functions. It establishes a framework for a common
State risk-based approach that places emphasis on the control – Second, only contribute to systemically improving security
of likely (vs. less likely) risks and threats. This framework will controls over information and information systems (as
ensure the safeguarding of organizational information assets informed by both departmental and OIMT evaluations
while not ignoring other key factors, such as cost, performance, and assessments).
mission requirements, and efficiency. The framework will
also establish and document a risk acceptance management – Third, provide security operations to monitor continuously
chain based on program-level responsibilities and risk impact the status of security infrastructure in a proactive nature.
awareness by bringing risk management and acceptance
– Fourth, provide information assurance guidance and align to
processes closer to the program level with assurance statements
future-state technology deployments in an Agile framework.
supporting senior management’s overall responsibilities.
4
Prioritization also attempts to take into account the appropriate sequencing of activities necessary to ensure that foundational capabilities exist to
enable the success of dependent activities.
5
This effort is a change in management approach aimed at efficiency improvements and cost avoidance. The goal of the change is to better select and
manage IA resources and projects. An effective IA program will likely result in decreased costs through reduced risk of potential litigation or penalty
associated with significant data breaches.
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 11
– Fifth, contribute to security as an enabler to state
business processes.
12 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
3
FUNDAMENTALS OF INFORMATION
ASSURANCE RISK MANAGEMENT
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 13
3
FUNDAMENTALS OF INFORMATION
ASSURANCE RISK MANAGEMENT
The management, assessment, and mitigation of risks to IT systems are a fundamental component of every organization’s
information assurance and cyber security program. An effective risk management process enables an organization to protect its
information assets and supports its ability to carry out its mission successfully.
The following activities compose the Risk Management Framework. These activities are fundamental to the management of
organizational risk and can be applied to both new and legacy information systems within the context of the System Development
Life Cycle (SDLC) and the State of Hawai`i’s Enterprise Architecture (EA).
Categorize the information system and the information processed; stored, and transmitted by the system, based on the potential impact to the organization
should events occur to put the system and its information at risk. The organization assigns a security impact value (low, moderate, high) for the security
objectives of confidentiality, integrity, or availability for the information and information systems that are needed by the organization to accomplish its
mission, protect its assets and individuals, fulfill its legal responsibilities, and maintain its day-to-day functions.
14 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
Security categorization standards for information and information systems provide a common framework and understanding for
documenting the potential impact to organizations or individuals should there be a breach of security (e.g., a loss of confidentiality,
integrity, possession, utility authenticity or availability) to information or the information system. Federal Information Processing
Standard (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems, can assist departments
to determine the security category of data and information systems. The categorization process also promotes effective
management of information systems and consistent reporting.
Select an appropriate set of security controls for the information system after determining the security categorizations. FIPS documents specify minimum-
security requirements for information and information systems for seventeen security-related areas that represent a broad-based, balanced information
security program. The 17 security-related areas encompass the management, operational, and technical aspects of protecting federal information and
information systems. Furthermore, organizations must meet the minimum-security requirements by selecting an appropriately tailored set of baseline
security controls based on an assessment of risk and local conditions including the organization’s specific security requirements, threat information, cost-
benefit analyses, or special circumstances.
To address minimum security requirements, the State will make use of security controls from “NIST SP 800-53, Recommended
Security Controls for Federal Information Systems,” summarized6 below. This publication provides a catalog of controls that
departments may select to protect their information systems in accordance with their missions and business requirements. An initial
baseline set of security controls is determined based on the impact analysis conducted under the provisions of FIPS standards.
Departments can tailor and supplement the selection of baseline security controls, based on their assessment of risks. Guidance on
tailoring the baseline controls is provided by NIST.
MA Maintenance Operational
PL Planning Management
6
“NIST 800-53: Recommended Security Controls for Federal Information Systems.” National Institute of Standards and Technology, 2011.
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 15
Implement the security controls in the information system. Various
Federal guides provide assistance in implementation of security controls;
the State will use the NIST Special Publication Checklists for IT Products
(http://checklists.nist.gov/) whenever available or vendor best practice
standards. Checklists of security settings are useful tools that have
been developed to guide IT administrators and security personnel
in selecting effective security settings that will reduce the risks and
protect systems from attacks. A checklist, sometimes called a security
configuration guide, lockdown guide, hardening guide, security technical
implementation guide, or benchmark, is a series of instructions for
configuring an IT product to an operational environment. Checklists can
be effective in reducing vulnerabilities to systems, especially for small
organizations with limited resources. IT vendors often create checklists
for their own products, but other organizations such as consortia,
academic groups, and government agencies have also developed them.
Assess the security controls using appropriate methods and procedures Illustration from Information Security Risk Assessment
- Practices of Leading Organizations
to determine the extent to which the controls are implemented correctly,
operating as intended, and producing the desired outcome with respect
to meeting the security requirements for the system. The IA and CS
Division will provide certification services to assist departments in
meeting assessment requirements. 3.1 BASIC ELEMENTS OF THE RISK
ASSESSMENT PROCESS
Whether they pertain to information security or other types
Authorize information system operation based on a determination of risk, risk assessments are a means of providing decision
of the risk to organizational operations, organizational assets, or to makers with information needed to understand factors that
individuals resulting from the operation of the information system and the can negatively influence operations and outcomes and make
determination that this risk is acceptable. NIST SP 800-37, Guide for the informed judgments concerning the extent of actions needed
Security Certification and Accreditation of Federal Information Systems, to reduce risk. For example, bank officials have conducted risk
discusses the steps leading to an official management decision by a assessments to manage the risk of default associated with
senior agency official to authorize operation of an information system, their loan portfolios, and nuclear power plant engineers have
accepting the risks to agency operations, agency assets, or individuals conducted such assessments to manage risks to public health
based on the implementation of an agreed-upon set of security controls. and safety. As reliance on computer systems and electronic
Certification and accreditation of information systems are required data has grown, information security risk has joined the array
activities for federal agencies. of risks that governments and businesses must manage.
Regardless of the types of risk being considered, all risk
assessments generally include the following elements:
7
Information Security Risk Assessment - Practices of Leading Organizations. Supplemental Document. Washington D.C., U.S. General Accounting Office.
1999. page 6.
16 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
• For the most critical and sensitive assets and operations, • Handle new information types.
estimating the potential losses or damage that could occur if a
threat materializes, including recovery costs. • Conduct the categorization process for their individual
information systems.
• Identifying cost-effective actions to mitigate or reduce the
risk. These actions can include implementing new • Document the categorization decision in the system
8
Richey, Warren, “Echoes of 2001 shoe bomber in Detroit attack – CSMonitor.” December 28, 2009. The Christian Science Monitor. http://www.
csmonitor.com/USA/Justice/2009/1228/Echoes-of-2001-shoe-bomber-in-Detroit-attack. [May 8, 2010].
9
“Five dead in Middletown explosion, at least 12 injured, WTNH.com Connecticut.” February 29, 2010. WTNH television. http://www.wtnh.com/dpp/
news/middlesex_cty/middletown-power-plant-explosion. May 8, 2010.
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 17
Table 2 - Identified Risks
Internal Current employee Poor accountability; no audit policy; no security Loss of integrity; altered data
awareness program
Man-made Weapons of mass No external facility monitoring; insufficient Data loss and
destruction; e.g., car physical perimeter; no physical inspection of unrecoverable downtime
bomb; package bomb; incoming packages
biological threat
Once a list of risks to the enterprise is determined, the next availability of the exposed cyber asset or information. This can
step is to look at the methods and tools that can be used to be done by the introduction of errors to information or data (in
determine what risks are the highest priority and/or will bring printed or electronic form); the introduction of malicious source
the greatest return on investment. code or software into an information system; or the introduction
of unauthorized changes to automated processes/procedures.
3.5 RISK CATEGORIES 4. Weak Processes: includes risks associated with the intentional
or unintentional harm to any type of sensitive department
This Plan discusses the prioritization of IA initiatives in terms
information or data (either in hard copy printed or soft copy
of risks. The following generalized risk categories provide a
electronic form), information system, or processes/procedures
basis for that discussion. A description has been provided in
resulting from inadequate controls either technical or manual
an attempt to clarify the types of risks included within each of
(e.g., checks and balances, prone to human error and/or social
the categories. The risks are not ordered by any weighting of
engineering, etc.). These risks have the potential to affect the
importance nor are they equal in all applications.
confidentiality, integrity, or availability of information or the
1. Information Exposure/Loss: includes risks associated with the information system adversely.
intentional or unintentional loss, theft, compromise, or
5. Unsecured Operating Environments: includes risks associated
disclosure of any type of sensitive department information or
with the intentional or unintentional harm to any type of
data, either in hard copy printed or soft copy electronic form
sensitive department information or data (either in hard copy
that may be exploited by any unauthorized individual.
printed or soft copy electronic form), information system,
2. Unauthorized Use: includes risks associated with the or processes/procedures resulting from inadequate controls
intentional or unintentional use of any type of sensitive either technical or manual (e.g., enabling the unauthorized
department information or data (in either hard copy printed or modification of security controls within an information
soft-copy electronic form), information system, or processes/ system increasing the systems vulnerability and susceptibility
procedures by an unauthorized individual. of information to compromise, enabling the unauthorized
escalation of privileges to perform inappropriate functions on
3. Exposure to Contaminated Environments: includes risks a system or to gain unauthorized access to information, etc.).
associated with the intentional or unintentional exposure of These risks have the potential to impact the confidentiality,
any type of sensitive department cyber asset or information to integrity, or availability of information or the information
potentially contaminated, untrusted, or insecure environments system adversely.
that may adversely affect the confidentiality, integrity, or
18 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
6. Loss of Public Confidence: includes risks associated with The two current base methodologies that are used by security
the intentional or unintentional harm to the reputation of the professionals are the qualitative and quantitative methods. Each
department and/or its leadership and the confidence of the method is effective, but completely different in its approach
public or senior government officials in the department’s ability to determining the level of risk. The issue is that each method
to conduct its mission effectively. could result in different outcomes.
• Less rigorous
3.6.1 QUALITATIVE METHOD is the use, by the research team, of various subjective indexes
such as ordinal hierarchy values: low-medium-high, vital-critical-
The qualitative risk analysis is a process of assessing of the important, benchmark, etc.
impact of the identified risks within an enterprise. By using
As described by Robert Jacobson in his analysis of Risk
this process, the priorities of vulnerabilities are determined to
Assessment and Risk Management, once each risk is ranked, a
solve the risks based on the impact they could have on the
risk matrix (shown in Table 4) can be developed.10
enterprise. The definite characteristic of the qualitative method
Impact
Almost Certain
Likely
Likelihood
Possible
Unlikely
Rare
Jacobson, Robert V., Computer Security Handbook, Volume 2, Risk Assessment and Risk Management. New York, NY: John Wiley and Sons, Inc., 2009.
10
Chapter 62.
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 19
In the example diagram in Figure 4, the point on the upper right is the risk that should be addressed immediately, while the lower
left can be a risk that is accepted by management.
Munteanu, Adrian Bogdanel, “Information Security Risk Assessment: The Qualitative Versus Quantitative Dilemma. Managing Information in the Digital
11
Economy: Issues & Solutions,” Proceedings of the 6th International Business Information Management Association (IBIMA) Conference, pages 227-232.
June 19-21, 2006. (http://ssrn.com/abstract=917767)
20 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
The most widely used mathematical models used in qualitative risk:
SLE = AV * EF
Exposure Factor (EF) The proportion of an asset’s value that is likely to be destroyed by a particular risk
(0% ≤ EF ≤ 100%)
Single Loss Expectancy (SLE) The expected monetary loss every time a risk is exploited
Average Rate of Occurrence (ARO) The probability that an exploitation of a risk will occur within a year
(0.0 ≤ ARO ≥ 1.0)
Annual Loss Expectancy (ALE) The monetary loss that can be expected for an asset due to a risk over a
one-year period
Asset Value (AV) A monetary value assigned to an asset at risk. This may be based on its actual cost,
and/or the cost of its replacement.
Data files User HDD failure $9,450 17% $1,650 0.9 $1,485
The problem of using the ALE to make the determination of risk Therefore, it is important to make sure when using the
is that, when the ARO is only evaluated at one loss per year and quantitative method of risk analysis not to look at the risk as
a risk occurs either during that year or future years, there can be a single point in time, but as a value that changes with the
considerable variance in the actual loss. passage of time.
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 21
An example might be the failure of an automatic teller machine
(ATM) to dispense cash. To determine the possible reasons for
3.8 CHALLENGES ASSESSING
the ATM’s failure, the event tree and fault tree would be used. INFORMATION SECURITY RISKS
The consequences would be dissatisfaction of customers and
loss of business. Reliably assessing information security risks can be more
difficult than assessing other types of risks, because the data
3.7.2 FORENSIC ANALYSIS OF on the likelihood and costs associated with information security
risk factors are often more limited and because risk factors are
RISKS IN ENTERPRISE SYSTEMS (FARES) constantly changing. For example:
FARES is a new risk-centric approach to risk analysis. The • Data are limited on risk factors, such as the likelihood of a
methodology takes a step back from traditional risk analysis, sophisticated hacker attack and the costs of damage, loss, or
which looks at individual vulnerabilities, and looks at a disruption caused by events that exploit security weaknesses.
broader view.
• Some costs, such as loss of customer confidence or disclosure
This approach uses both qualitative and quantitative aspects of of sensitive information, are inherently difficult to quantify.
risk analysis in combination instead of one or the other method.
• Although the cost of the hardware and software needed to
Peter Stephenson mathematically defines risks in an enterprise strengthen controls may be known, it is often not possible
system12 as the following: to estimate precisely the related indirect costs, such as the
possible loss of productivity that may result when new controls
are implemented.
Information Systems Risk () is the probability () that a threat • Even if precise information were available, it would soon be
() will successfully exploit a vulnerability (v) to create an out of date due to fast-paced changes in technology and
impact ( ). factors such as improvements in tools available to
would-be intruders.
Using this base equation, the basic concept of FARES is that
risks consist of many vulnerabilities and threats that can be This lack of reliable and current data often precludes precise
exploited. Attempting to identify and mitigate the multitude determinations of which information security risks are the most
of vulnerabilities and threats is almost impossible to identify significant and comparisons of which controls are the most
and manage. Creating larger supersets of vulnerabilities cost effective. Because of these limitations, it is important that
and threats makes the risk analysis and assessment a more organizations identify and employ methods that efficiently
manageable effort. achieve the benefits of risk assessment while avoiding costly
attempts to develop seemingly precise results that are of
Instead of trying to identify individual software vulnerabilities, questionable reliability.
FARES suggests creating a superset using common criterion
called software vulnerabilities and working towards the credible
threats can exploit them. Next, look at the impacts that would
be caused by a successful exploitation of the threats, and then
countermeasures can be put into place to lessen or completely
remove the impact to the enterprise.13
12
Stephenson, Peter R., “Forensic Analysis of Risks in Enterprise Systems.” The Center for Digital Forensics Studies, Ltd. 2010. http://www.google.com/
search?hl=en&source=hp&q=Forensic+Analysis+of+Risks+in+Enterprise+Systems&btnG=Google+Search&aq=f&aqi=&aql=&oq=&gs_rfai= [May 8, 2010]
13
Ibid, page 4.
22 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
Table 7 - CISSP 10 Domains of Information Assurance
A set of mechanisms (e.g. two-factor authentication, Personal Addresses the preservation of the State’s IT/IRM infrastructure
Identification Numbers [PINs], card readers, etc.) that work in in the face of major disruptions, natural or man-made, to
concert to create security architecture protecting information normal business operations and guarantee continuity
system assets of government
The principles, means, and methods of disguising (encrypt/ Security controls implemented and tested during the SDLC.
decrypt) information during the storage, use, or transmission
of information during its life cycle with the intent to make a
foe take extraordinary measures to recover the data
Addresses the threats, vulnerabilities, and countermeasures Used to identify the controls over hardware, media, and the
that can be utilized to protect an enterprise’s resources and operators with elevated access privileges to any of
sensitive information physically. Includes site/facility design these resources
considerations, perimeter security, fire and security control
mechanisms, etc.
The concepts, principles, structures, and standards used to Network structures, transmission methods, transport formats,
design, implement, monitor, and secure operating systems, and security measures to provide a secure infrastructure
equipment, networks, applications, and those controls used
to enforce various levels of security
Legal, Regulations, Investigations, and Compliance Information Security Governance and Risk Management
Addresses computer crime laws and regulations; the Identifies the State’s information assets and the development,
investigative measures and techniques that can be used to documentation, and implementation of policies, standards,
determine if a crime has been committed and methods to procedures and guidelines
gather evidence
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 23
Figure 5 - Elements of Information Assurance and Cyber Security (Parkerian Hexad)
In 1998, Donn B. Parker expanded the original three fundamental • Possession – Also sometimes referred to as Control;
elements of IA and CS into six elements of information security: maintaining control of the information. This includes physical
Confidentiality, Possession (or Control), Integrity, Authenticity, controls and preventing copying or sending information to
Availability, and Utility.14 unauthorized users (e.g., using a single software license for an
entire organization or software piracy).
• Confidentiality – Limiting the access and disclosure to
authorized users; at the same time, protecting information • Authenticity – Misrepresenting information, repudiation, and
from unauthorized disclosure or not only the information but misuse of information.
the existence of the information. An attacker cannot attack if
the existence of the information is masked. • Utility – Information maintains usefulness during its life cycle
(e.g., an employee forgetting a decryption password or losing
• Availability – Access to information is not restricted by time or the master key to a data center).
circumstances; information anytime, for any mission, is the
basic tenant of Business Continuity, Disaster Recovery, and This document also identifies multiple strategic investment
Continuity of Government planning. recommendations, categorized in a multi-layer defensive
solution framework and aimed at addressing inherent
• Integrity – The trustworthiness or validity of the information weaknesses in the State’s internal and external security
being accessed or protecting it from modification by posture. While actions have been undertaken or are underway
unauthorized users, corruption during transmission, or to address many of these earlier recommendations, some will
recovery of information from trusted sources. be reiterated in this Plan where necessary to indicate the need
for improved capabilities.
14
Parker, Donn B., Fighting computer crime: a new framework for protecting information. New York, NY USA: John Wiley & Sons. 1998.
24 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
Figure 6 - Security Implementation Strategy Based on Importance vs. Complexity
15
An information system is a discrete set of information resources organized expressly for the collection, processing, maintenance, use, sharing,
dissemination, or disposition of information.
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 25
Table 8 - Categories of Security Controls Related to Information Assurance
Physical Security Preventive physical controls, traditionally “guards, guns and gates;” provide an environment to
safely process information as well as barriers to unauthorized
access to systems
Computing Infrastructure Applies to all infrastructure components, networking, internet service providers (ISPs), servers,
mobile devices, desktops, etc. sponsored by, developed for, or maintained or operated on
behalf of the State, regardless of whether they are located at a State computing facility. The
infrastructure also applies to pilot and proof-of-concept projects.
Operating Systems An operating system (OS) is a set of software that manages computer hardware resources and
provides common services for computer programs. The OS is a vital component of the system
software in a computer system.
Applications and Databases Security controls that cover software applications developed internally, by external acquisition,
outsourcing/offshoring, or through hybrid approaches. These controls address all aspects
of controls from determining information security requirements and protecting information
accessed by an application or database to preventing unauthorized use and/or actions of
an application.
Users Ensure that unauthorized users do not get into the system and by encouraging (and
sometimes forcing) authorized users to be security-conscious; for example, by changing
their passwords on a regular basis. The system also protects password data and keeps track
of who’s doing what in the system, especially if what they are doing is security-related (e.g.,
logging in, trying to open a file, using special privileges).
26 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
Table 8 - Categories of Security Controls Related to Information Assurance
Basic At the basic level, processes are usually ad-hoc and chaotic. The organization usually does not provide a
stable environment. Success in the organization depends on the competence and heroics of the people in
the organization and not on the use of proven processes.
Organizations often produce products and services that work; however, they frequently exceed the
budget and schedule of their projects.
Organizations are characterized by a tendency to over commit, abandon processes in the time of crisis
and inability to repeat their past successes.
Prioritized The organization has achieved all the specific and generic goals at the basic level. In other words, the
projects of the organization have ensured that requirements are managed and that processes are
planned, performed, measured, and controlled.
The reflected discipline for the process helps to ensure that existing practices are retained during times
of stress. When these practices are in place, projects are performed and managed according to their
documented plans.
Project requirements, processes, work products, and services are managed. The status of the work
products and the delivery of services are visible to management at defined points.
Commitments are established among relevant stakeholders and are revised as needed. Work products
are reviewed with stakeholders and are controlled.
The work products and services satisfy their specified requirements, standards, and objectives.
Optimized The organization has achieved all the specific goals of the process areas assigned to maturity levels basic,
managed and optimized, including the generic goals assigned to maturity levels basic and managed.
Processes are continually improved based on a quantitative understanding of the common causes of
variation inherent in processes.
Optimization focuses on continually improving process performance through both incremental and
innovative technological improvements.
Quantitative process improvement objectives for the organization are established, continually revised to
reflect changing business objectives, and used as criteria in managing process improvement.
The effects of deployed process improvements are measured and evaluated against the quantitative
process improvement objectives. Both the defined processes and the organization’s set of standard
processes are targets of measurable improvement activities.
Optimizing processes that are agile and innovative depends on the participation of an empowered
workforce aligned with the business values and objectives of the organization. The organization’s ability
to respond rapidly to changes and opportunities is enhanced by finding ways to accelerate and share
learning. Improvement of the processes is inherently part of everybody’s role and results in a cycle of
continual improvement.
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 27
Figure 7 - Information Assurance and Cyber Security Capability Maturity Model with Example Security Controls
Once employed within an information system, security controls controls better, it is necessary to understand that there are
are assessed to provide the information necessary to determine specific categories of controls.
their overall effectiveness; that is, the extent to which the
controls are implemented correctly, operating as intended,
and producing the desired outcome with respect to meeting
the security requirements for the system. Understanding the
overall effectiveness of the security controls implemented in the
information system and its environment of operation is essential
in determining the risk to the organization’s operations and
assets, to individuals, to other organizations, and to the nation
resulting from the use of the system.
28 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
4
STRATEGIC INFORMATION ASSURANCE
AND CYBER SECURITY GOALS AND OBJECTIVES
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 29
4
STRATEGIC INFORMATION ASSURANCE
AND CYBER SECURITY GOALS AND OBJECTIVES
The IA initiatives identified in this Plan largely fall into one or • Data Centric – The data-centric approach focuses on the
more of six strategic goal areas: data itself and where it lives: the database. Data-centric
continuous monitoring protects the data by identifying and
• Protect Data – As demonstrated in a succession of well- fixing database vulnerabilities before exploitation occurs.
publicized security events, the protection of privacy and
other sensitive information is one of the most significant • Protect Access – In meeting the two significant objectives of
challenges faced in organizations today. This becomes protecting authorized users’ access to the right information,
even more challenging when addressed in the context of the State must first strengthen its ability to granularly
protecting access. Opening the information infrastructures establish and enforce access rules, and then tie these rules to
to provide improved access to the right information for its information assets so that only those individuals with rights
authorized users—anywhere, anytime, and any mission to information have those rights. In addition, to address the
securely and reliably—is fundamental to State’s ability to access objective of reliability, the State must deploy secure,
preserve and improve its mission capabilities. Meeting this reliable, capacious, and diverse access solutions that allow
objective; however, increases the complexities associated users access to needed information—anywhere and at
with protecting our sensitive information. any time.
• Proactive Continuous Monitoring – The goal of continuous • Situational Awareness – To support an awareness of
monitoring is to provide real-time awareness of a infrastructure or information risk related to configuration
department’s security posture, enabling departments to or patching weaknesses, exposure, attacks, and deliberate
address threats and to remediate vulnerabilities proactively or accidental misuse, through implementation of security
before they can be exploited. monitoring technologies and operational monitoring of
these technologies.
• Network Centric – The network-centric approach focuses on
providing defense at the periphery. This is what many would The New Day Plan established a unity of purpose with One
consider the traditional approach to provide security to the Team – One Mission – One Vision – One Set of Goals and
enterprise. While this method of protection is still valid, a Objectives. This Plan was one of the six focus areas identified as
more radical approach to security must include the life cycle part of the proposed four phases to be completed over the next
of data, from creation, how it is used when valid, its use four years of the current administration.
during any archival or retention requirements, and through
its proper method of destruction.
30 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
Figure 3 - Information Assurance and Cyber Security Roadmap
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 31
5 PERSPECTIVE ON INFORMATION ASSURANCE
32 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
5 PERSPECTIVE ON INFORMATION ASSURANCE
The most important aspect of effectively managing the risk acquisition of goods and services incorporates information
to the organization’s operations and assets associated with security considerations, preferably as early as possible in
operating enterprise information systems is a fundamental the system development life cycle process. Information
commitment to information security on the part of the senior security requirements must be considered at the same level
leadership of the organization. This commitment is the of importance and criticality as the mainstream functional
internalizing of information security, as an essential mission requirements established by the enterprise.16
need. Fundamental commitment to information security
translates into ensuring sufficient resources (both dollars and In 2011, Gartner conducted a survey of CIOs in Federal, state,
people) are available to provide an appropriate level of security local, and private sector organizations to determine the current
for the organization’s information systems. Information security level of concerns about the security posture of organization’s
must be a top priority within the enterprise and structurally and where they saw the current threats in order to map these
embedded within the infrastructure of the organization. This threats to available technology solutions.17 The results are shown
implies that every new initiative within the enterprise from in Figure 9.
the development of corporate strategies and programs to the
Figure 9 - CIO Top Information Assurance and Cyber Security Concerns (2011)
Ross, Dr. David, “Managing Enterprise Risk in Today’s World of Sophisticated Threats.” National Institute of Standards and Technology Washington:
16
GPO. 2007.
17
Gartner research at www.gartner.com
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 33
5.1 COMMITMENT processes based upon those risks take place. The designated
responsible party reports the status of the Information
To perform its mission effectively and efficiently, IT is Security Program within the department as appropriate.
an important component of each State organizational
element’s ability. Effective and efficient information security 5.1.2 DIRECTORS, CHAIRS, MANAGERS, AND OTHER
programs require clear direction and commitment from top
management and administration. IA and CS are integrated SUPERVISORS
functions that require effective organization and collaboration
Departments, divisions, branches, and attached agency
throughout the State. Protecting our electronic information
directors, chairs, managers, and other supervisors responsible
and IT is the primary function of IT security. As an important
for managing employees with access to information
mission enabler, IT security requires commitments on the
and information systems are responsible for specifying,
part of both management and staff. These commitments
implementing, and enforcing the specific information
will sometimes involve sacrifices. The loss of previously
security controls applicable to their respective areas. This
enjoyed computer use flexibilities that result in a gain in
includes ensuring all employees understand their individual
the overall level of protection against today’s evolving IT
responsibilities related to information security, and ensuring
threats can be the hardest hurdle for many organizations to
employees have the access required (and only the access
make. Management’s role is key to an organization’s success
required) to perform their jobs. Supervisors should periodically
in addressing the changes and impacts of any security
review all users’ access levels to ensure they are still appropriate
improvement strategy.
and take the appropriate action to correct discrepancies/
As State employees, all of us have a shared responsibility deficiencies. Supervisors are required to notify Human
to help maintain a strong security posture within our Resources and the IT Help Desk proactively of any change
organizational environments. Nowhere is this more evident in employment status that impact access requirements.
than with management. The security posture of State is only Supervisors are also responsible for reporting suspected misuse
as strong as that of our weakest organizational component or other information security incidents to the DISO, Chief
or user. This is evident in both outsider (external) and insider Information Security Officer (CISO), and other appropriate
threat assessments conducted on the State’s IT infrastructure. parties.
To be most effective, management must lead the way by
demonstrating and emphasizing its commitment to improving
the IT security of its organizations.
5.1.3 CHIEF INFORMATION SECURITY OFFICER (CISO)
The State of Hawai`i CISO is designated as the Program
This Plan recommends departmental, division, branch, and Officer responsible for coordinating and overseeing the IA
office senior leadership re-emphasize that IT infrastructure and CS Program. The CISO must work closely with the various
contributes to our ability to accomplish our mission, and departments throughout the State. The CISO may recommend
that every employee and contractor’s actions are key to our that divisions/branches of specific departments delegate other
overall success and contribute to the reliability and integrity representatives of the organization to oversee and coordinate
of the infrastructure. IT security needs to be emphasized as particular elements of the Program.
an important means of protecting our IT infrastructure—one
of the most important tools that we have today. To be most The CISO also assists individuals who have the responsibility
effective, IT security must be integrated into and considered and authority for information (owners) with information security
in our everyday processes, planning, budgeting, and designs. best practices relating to issues such as:
IT security is not an IT responsibility, but every IT user’s
responsibility, from accountants, human resources specialists • Establishing and disseminating enforceable rules regarding
and scientists to budget analysts, planners, and engineers. access to and acceptable use of information resources
34 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
Finally, the demonstration of commitment must be reflected To enable security programs at the department, division,
in the allocation of resources, both human and capital, to branch, and office levels to succeed, this Plan recommends
the management and accomplishment of strategic security management establish realistic expectations and commit the
improvement goals. Without this important commitment, no appropriate resources. Those resources include adequate
significant progress can be made. 5.2 Communication Plan budget and staffing levels appropriate for the workload and
the tools to assist in managing the security programs—asset/
Effective, efficient communication should involve a dialog. To configuration management tools, automated certification and
ensure that communication lines remain open requires mutual accreditation (C&A) tools, etc.
respect for various disciplines and an equal voice in the process
for all disciplines within the department, bureaus, and offices. Separate recommendations with regard to resources are included
Establishing that dialog means: elsewhere in the Plan. 5.4 Measuring Quality Effectiveness
• Ensuring that all employees are engaged in the effort The State of Hawai`i has instituted numerous improvement
programs throughout the years. However, the sustainability
• Ensuring opportunities for everyone to provide input to and quality of the programs have, in many cases, deteriorated
the process over time. Many programs provide quick-fix or check-the-
box solutions and do not address the root causes. For any
• Recognizing that one solution may not work in every situation
improvement or strategic plan to provide long-term value and
When creating a new policy or recommendations and not become shelfware, it must be continuously reviewed and re-
guidance, effective communication of these changes is often evaluated for effectiveness.
a last thought. Failure to implement new policy and directives
It is recommended to review the Plan annually to ensure its
throughout the state in a timely manner can often be attributed
relevance and effectiveness related to emerging technologies
to the failure to raise awareness of the new guidance to the
and threats.
appropriate level in the IT workforce and user community. The
lack of repetition and variety in the communication of policy
perpetuates unawareness.
• Policy dissemination
• Management awareness
• Awareness training
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 35
6
INFORMATION ASSURANCE AND
CYBER SECURITY DIVISION
36 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
6
INFORMATION ASSURANCE AND CYBER SECURITY DIVISION
There are key reasons the IA&CSP-AWG recommends information security specialists are not going to be outvoted,
establishing, defining, and documenting formal IA and CS outmaneuvered, and otherwise overruled, clearly documented
roles and responsibilities. Even if roles have been defined, top management support for the information security function
in this era of emphasis on security governance it is critical must have been documented. With documented and approved
to document them as well. If information security roles roles and responsibilities, information security specialists can
are not clearly defined with the State and a roles and prevent or expediently resolve many arguments and get on with
responsibilities clarification project is still missing in the overall their work.
IT/IRM governance structure, it is encouraged to use the
following discussion to write a project justification memo to
management.
6.3 ESTABLISH FORMAL COMMUNICATION CHANNELS
At many organizations, the information security function has
Most departments have no dedicated security staff:
been repeatedly moved from department to department
• There is simply not enough time to complete or distributed across many departments. Many of these
non-security tasks. departments may not have known what to do with the
information security function. As a result, departmental
• Tasks are often put on hold as security functions are not seen management may not have seriously considered the
as an immediate need. recommendations offered by information security specialists.
Consequently, management may have postponed or failed
• Time-sensitive tasks are completed as quickly as possible with to fund a number of important information security projects.
no time for risk assessment, technology assessment, However, when roles and responsibilities for the information
or training. security function are specified and approved by top
management, all this can quickly change. Then the information
6.1 GARNER RESPECT AND RESOURCES security function will have a real home; in other words, it will
know where it fits into the organizational structure. In the
Documented role and responsibility statements are advisable course of defining a formalized and permanent home for the
for every department/division/branch and attached agencies, information security function, the ways that this function works
not just the IA and CS organization. Those organizational units with other internal groups will be defined. Then the information
with fully developed role and responsibility statements will security function will have formal communication channels
enjoy greater respect and greater resources. Within many of with top management that can be used to help get important
the State’s departments, information security is a new or still- projects underway.
undeveloped organizational function.
This means these same organizations are often missing 6.4 FOSTER COORDINATED TEAM EFFORT TO
documents that cover information security job descriptions,
mission statements, and reporting relationships. When these
SAFEGUARD INFORMATION
roles and responsibilities are documented and approved, the One additional important reason to document information
information security function will be increasingly recognized as security roles and responsibilities involves overcoming an
a legitimate and on-going organizational function, worthy of erroneous viewpoint that information security is something
respect and its own share of organizational resources. that can be handled by specialists in the Information Security
Department working alone. The job is way too big and way too
6.2 DEMONSTRATE TOP MANAGEMENT SUPPORT important to be left to the Information Security Department.
When roles and responsibilities are documented, specific people
One of the most important reasons to document role and inside and outside the Information Security Department will be
responsibility assignments is to demonstrate top management held accountable, and this in turn will cause them to become
support. Information security specialists often feel as though proactive. Without this accountability, in many cases they will
many people oppose what they are trying to do. Occasionally wait until there is a problem, and then do their best to handle
information security specialists must take an unpopular whatever has taken place. Today organizations can no longer
position, for example, postponing the cutover to a new software approach information security with a fix-on-failure mentality.
application until appropriate controls can be included. If the Research studies show that information security is ten times
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 37
less expensive when it is built into application systems before down. Likewise, a number of organizations are increasingly
they go into production instead of when it is added on after the taking the security tasks performed by Systems Administrators
systems have been placed in production. Stated a bit differently, and assigning these tasks to new information-security-specific
when it comes to information security, proactive planning and positions like Access Control System Administrator. Not only
management is considerably less expensive than reactive repair does this change provide better separation of duties, it also
and correction efforts. allows the organization to lower costs because the security-
specific jobs often pay less than the Systems Administrator
6.5 ENABLE BETTER ALLOCATION OF jobs. On a related note, when clear roles and responsibilities
documentation exists, management will know exactly what
ORGANIZATIONAL RESOURCES types of training programs it should send internal staff to,
and this will help avoid wasting resources on training that is
Many organizations are now turning to outsourcing firms not directly relevant to the jobs that the involved individuals
to handle their information security needs. While some perform.
management responsibilities such as making final decisions
about information security policies should ultimately rest on the
shoulders of internal management, a considerable amount of
6.7 REDUCE SINGLE POINT OF FAILURE
the security work can be outsourced. If roles and responsibilities Rather than eliminating the need for human involvement, the
are not clearly established at the time that a contract is new information systems that organizations are using today
negotiated, the organization that contracted the outsourcing (such as ecommerce systems) are increasing the reliance on
firm may find itself in a difficult spot. The outsourcing firm may certain types of people with specialized skills. For example, if
claim that the requested service (such as forensic investigation a critical technical person were to leave his or her employer
of a system break-in) is not in the contract, and that the abruptly, the organization might be hard pressed to continue
customer must pay an additional fee. All this of course assumes certain technical computer operations without this person. This
that the outsourcing firm has technically competent people increased reliance on people with highly specialized skills and
available at the time they are needed. training can be reduced by backup personnel, cross training,
sharing job responsibilities, documenting the work, and other
Of course, other consulting firms can also be called in, but with
tasks associated with the development of clear information
any of these options, precious time will be wasted negotiating
security roles and responsibilities.
fees, defining the work to be done, etc. While all of these ad-
hoc business arrangements are being made, a hacker could be The IA field is still in its infancy when compared to the
on the loose inside an organization’s internal network. To keep marketing, engineering, or accounting fields. While some
losses to a minimum, it is absolutely essential that roles and interesting new technological solutions to information security
responsibilities for all important information security activities problems are now on the market, in most organizations the
be defined in advance in outsourcing contracts. achievement of effective information security critically depends
on people. At this point in the evolution of the technology,
On a related note, if management wishes to outsource some
many information security problems can only be handled
or all of the information security function or if management
by people. For example, there is no commercially available
wishes to retain contractors, consultants, or temporaries to
technological solution to protect against the social engineering
assist with information security, then roles and responsibilities
(masquerading) threats that all organizations face. All too
must first be specified. Unless roles and responsibilities have
often, the people within an organization do not understand
been clearly defined, management will find it difficult or even
what management expects them to do, and this in turn will
impossible to draw up requests for proposals, legal contracts,
prevent the achievement of information security goals. When
outsourcing agreements, service level agreements (SLAs), and
roles and responsibilities have been clarified and documented,
other documents adequately with these third parties. Thus, clear
and selected people are then appropriately trained, they can
roles and responsibilities can be a significant enabler that allows
participate as essential members of the team that handles
management to better allocate organizational resources.
information security.
38 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
example, in the United States, the Health Insurance Portability
and Accountability Act (HIPAA) requires that organizations
6.9 INCREASE EFFICIENCY AND PRODUCTIVITY
managing personal health information document information Perhaps the most significant reason to establish and document
security related roles and responsibilities. clear roles and responsibilities involves increased productivity.
Statistical studies of business economics indicate that about
With clear documentation defining information security roles
half of productivity growth over time comes from more efficient
and responsibilities, an organization can show it is operating in
equipment, and about half comes from better trained, better
a fashion that is consistent with the standard of due care. Being
educated, and better managed labor. Thus, the clarification and
able to demonstrate this consistency may be very important
publication of information security roles and responsibilities can
in terms of reducing or eliminating management liability for
have a substantial positive impact on productivity, and thereby
losses and other problems. This documentation may help with
markedly improve cost savings. The information security field
a variety of liability concerns including computer professional
is a new area, and there is still great confusion about who
malpractice and breach of management’s fiduciary duty to
should be doing what. For example, when a worker has his
protect information assets. One example of an authoritative
or her laptop computer stolen, to whom should the event be
statement of the standard of due care which includes the
reported? Should a notice be sent to the Information Security
requirement to clearly specify information security roles and
Department, the Physical Security Department, or the Insurance
responsibilities is entitled Generally Accepted Information
Department? Maybe the notice should go only to the worker’s
Security Principles (GASSP).18
manager? Without clear roles and responsibilities, users will
Demonstrating compliance with the standard of due care can unnecessarily spend time figuring out the answers to questions
help shield the state from negligence and related liability claims. such as these. Likewise, if roles and responsibilities are clarified
and documented, employees will not waste their time trying to
figure out who to invite to certain meetings or who needs to
sign-off on certain proposals.
18
National Institute of Standards and Technology, Generally Accepted Information Security Principles for Securing Information Technology Systems.
1996, page 5.
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 39
6.10 CYBER SECURITY CONTROLS BRANCH (CSCB) • Governance — process by which policies are set and decision
making is executed
Branch Services. Firewall (perimeter and server tier), web
• Risk management — process for ensuring that important
application firewall, DDoS protection/mitigation, DLP, IR
business processes and behaviors remain within the tolerances
management, and IDS/IPS
associated with those policies and decisions
CSCB core functions:
• Compliance — process of adherence to policies and decisions
• Data threats
• Policies can be derived from internal directives, procedures
• Access control threats and requirements, or external laws, regulations, standards
and agreements.
• Access and authentication controls
• Technical compliance audits — automated auditing of
• Security gateways (firewalls, WAF, SOA/API, VPN) configuration settings in devices, operating systems,
databases, and applications.
• Security products (IDS/IPS, server tier firewall, file integrity
monitoring, DLP, antivirus, anti-spam • Application Security Assessments — automated auditing of
custom applications
• New security technology review and recommendations
• Vulnerability Assessments — automated probing of network
• Denial of service attacks protection/mitigation devices, computers and applications for known vulnerabilities
and configuration issues
• Secure base services such as DNS and/or DNSSEC, DHCP,
NTP, RAS, VPN, SNMP; management network segmentation • Penetration Testing — exploitation of vulnerabilities and
and security configuration issues to gain access to a an environment,
network or computer, typically requiring manual assistance
• Traffic/netflow analysis
• Security/risk rating — assessment of the overall security/
• Integration with virtual technology layer
vulnerability of the systems being tested, e.g., based on the
Challenges: OWASP Risk Rating Methodology
40 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
Branch Services. User-centric ID provider, federated IDs, requirements across clients
web single sign-on (SSO), identity provider, authorization
management policy provider, electronic signature, device • Resource hogging with unauthorized provisioning
signature, and user-managed access
• Complete removal of identity information at the end of
IAMB core functions:19 the life cycle
• Provisioning/de-provisioning of accounts (both cloud • Real-time provisioning and de-provisioning of user accounts
and on-premise applications and resources)
• Lack of interoperable representation of
• Authentication (multiple forms and factors) entitlement information
• Web SSO(e-granular access enforcement and session • Developing a user-centric access control where user requests
management; different from federated SSO) to service providers are bundled with their identity and
entitlement information
• Authorization (both user and application/system)
• Interoperability with existing IT systems and existing solutions
• Authorization token management and provisioning with minimum changes
• User profile and entitlement management (both user and • Dynamically scale up and down; scale to hundreds of millions
application/system) of transactions for millions of identities and thousands of
connections in a reasonable time
• Support for policy and regulatory compliance monitoring and/
or reporting • Privacy preservation across multiple tenants
19
Security as a Service Working Group, “Defined Categories of Service 2011.” Cloud Security Alliance, 2011
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 41
• Key rollover – re-issue of keys after a default expiration
date is reached
6.13.1 DELIVER SITUATIONAL AWARENESS
Situational awareness will ensure that the State’s enterprise
• Key history – retaining a history of all keys issued to an entity
is prepared to act and respond to threats to the network
can be important to ensure future access to items or functions
environment that occur hundreds of times a day and are
protected by expired or revoked keys
detected by intrusion detection systems, antivirus systems,
• Key backup – essential for private encryption keys; not firewalls, system logs, and access logs. Many IT organizations
recommended for private signing keys due to the resulting risk struggle to compile the resources needed to review the data
of compromising nonrepudiation. (If someone else, for coming from all of these systems. On a network, security
example, a system administrator, can access private signing situational awareness is a constant ongoing health check.
keys, reliable authentication via the private signing key is no A zero-day threat can move through a network in seconds,
longer possible. However, organizations are advised to retain wreaking havoc and putting business-critical systems at risk.
backups of private encryption keys to protect against technical The Security Operations Center (SOC) diagnoses attacks
failures or rogue encryption activity.) through constant monitoring of managed devices on the
network and correlates the data in real-time so that operators
can see what is happening as it is happening and quickly
6.13 SECURITY OPERATIONS MONITORING respond to the threat.
BRANCH (SOMB) One of the SOC’s most powerful functions is that it offers
proactive awareness across multiple security-related systems.
The Security Operations Monitoring Branch (SOMB) provides
The SOC can consolidate all reports from the devices and tie
proactive monitoring of the technology infrastructure and data
the information together into a coherent visual representation
as it is used and flows into, out of, and within an organization.
to close windows of risk. By looking across the entire enterprise
Branch Services. Log management, event correlation, security/ and combining this information with the data in the Network
incident response, scalability, log and event storage, interactive Operations Center (NOC), stealth attacks can be exposed and
searching and parsing of log data, and logs immutable result in broader, more complete protection for the
(for legal investigations) entire enterprise.
42 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
6.13.4 THREAT CONTROL AND PREVENTION a state government may need to have a SOC that collects
and manages information from distinct agencies such as the
Organizations also must ensure that threats are either prevented educational system and the police department. Leveraging the
or contained. This involves early notification of suspicious organization’s security policy standards, responsibilities must
activity and the ability to implement a containment mechanism be defined including who is responsible for specific tasks and
quickly. For example, if a firewall and network management assigning accountability for response and control for each
system report the infiltration of a root kit aimed for a targeted business unit or agency.
host, the operator could be alerted to this root kit and remove it
As these responsibilities will be defined and communicated,
from the target host before the installation process is complete
the SOC tools must support these specific roles. Security
and the host has been compromised.
information management products must provide the ability to
Organizations may not always be able to prevent threats from federate trust across the departments and deliver near real-time
infiltrating a network entirely, but they can prevent their spread. reports based on unique roles.
Should a network system be compromised, organizations can
use the SOC to quickly identify the affected hosts and lock 6.13.7 ESCALATION PATH
them down from the rest of the network. Routers, switches,
and VLANs could be reconfigured to limit the reach of the A supplementary requirement to the people and responsibility
compromised system and prevent the spread of the threat, thus need involves knowing how and when to escalate events.
giving administrators time to remediate the risk before further Consider a subsidiary company at a global corporation whose
damage occurs. security is managed by the parent company’s centralized SOC.
If a fast-spreading worm is reported to the SOC and action
To feasibly contain and prevent security incidents, critical alert is immediately required at the subsidiary location but the
information must be disseminated quickly and accurately so subsidiary staff is not available when the worm hits due to time
that administrators can take action. The SOC must be able to zone differences, the SOC operator must know:
validate and correlate alerts and information, put these events
in context with the organization’s network environment, and • Who to call to receive appropriate approval to enforce the
provide this critical intelligence to key staff in real-time via remediation action
various alerting mechanisms such as emails, pagers, or
trouble ticketing. • Whether the nature of the threat is critical enough to
implement the remediation immediately without approval
6.13.5 EASE ADMINISTRATIVE OVERHEAD It is critical to have a SOC that is integrated within a corporate
workflow chain and the Change Management systems. The
Organizations have implemented various threat management security information management system should have the
systems to protect them from the impact of security events. ability, based on the criticality of the threat and user’s role, to
The millions of alerts generated by each individual system— administer the system from within the security console (restart
such as intrusion detection systems, antivirus systems, or shut down a system), implement a remediation (e.g., push a
firewalls, operating system logs, and access control systems— patch through a software delivery system), or open a trouble
are overwhelming. Some organizations engage several staff ticket to deploy a technician to address the issue.
members to monitor these systems for potential threats. Other
organizations simply do not have the staff or budget to monitor
them. Additionally, organizations are challenged to find staff 6.13.8 AUDIT AND COMPLIANCE SUPPORT
with the appropriate skillsets to monitor one or more of
One of the most critical business needs that the SOC can
these systems.
help address is the requirement for auditing to comply with
The SOC should be designed to involve the least amount of corporate, government, and industry regulations such as HIPAA,
human overhead. The SOC provides organizations with the IRS 1075, and PCI-DSS. Having quick, flexible access to threat
ability to centralize all critical security information into one information, identity and access control data, and patch levels
single centralized console and reduce the need for multiple staff is critical for proving compliance. Historically, organizations rely
members to manage and monitor the unique devices. The goal on existing documentation or generate new documentation
is to empower a few administrators with the best information to prepare for an audit. The process of manually creating
to enable fast, automated responses. Security information documentation for each audit is not only time consuming but
management tools that are open and interoperable make this prone to errors. SOCs are critical business tools when used for
goal easier to accomplish because the disparate data can be audit and compliance reporting. SOC real-time reports offer an
correlated and integrated into a single management tool. accurate reflection of the system’s current state. For example,
consider an organization that has a corporate security policy
for identity management that requires 30-day password aging
6.13.6 PEOPLE AND RESPONSIBILITIES for all accounts on all servers. The configuration settings of the
servers can be reviewed, but the auditor can also use the SOC
State departments must agree to share trust and administrative
log data to search for accounts whose passwords were changed
control across departments, divisions, branches, attached
outside of the aging parameters.
agencies, and among partner organizations. For example,
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 43
6.13.9 INCIDENT RESPONSE AND RECOVERY 6.13.13 PROACTIVE INFRASTRUCTURE MONITORING
When systems are affected by a security event, administrators Zero-day threats, such as malware and viruses, can spread
must be ready to respond as efficiently as possible to limit within minutes across the world and throughout an organization.
the damage, determine the root cause, and get the system The SOC must provide information in real-time, giving operators
back up and running quickly. A well-designed SOC empowers the data to take action immediately. At the same time, the SOC
administrators to see attacks on the network and helps them also must be able to provide automated actions and resolutions
leverage incident management tools to pinpoint and to threats such as restarting systems, initiating a trouble ticket
remediate problems. to the help desk to initiate and implement shielding tactics, and
working with a patch management system to push patches to
While the business requirements for the SOC are fairly clear 6.13.14 UPTIME 24/7, 365 DAYS OF THE YEAR
and intuitive, organizations must also focus on the underlying
technical components and functions needed to deliver on those If a network is running 24/7/365, the SOC must also be up and
business requirements. running in conjunction with the network. Security information
management tools help provide the high-availability support
6.13.11 SPEED OF AGGREGATION AND CORRELATION needed to meet the always-on requirement.
Security devices on a network send a great deal of data and 6.13.15 SUPPORT FOR FEDERATED AND
alerts. When these are aggregated into a single point for review,
the sheer volume can be overwhelming. Depending on the size DISTRIBUTED ENVIRONMENTS
and complexity of the network, “a lot” can easily translate into
hundreds of millions of alerts a day—far too many events for any Whether they support multiple business units, subsidiaries, or
human to monitor. complex partner and customer frameworks, many enterprises
run on a federated model. Various groups, sometimes with
The SOC’s intelligent console must support the business different business charters, manage portions of the federated
by sifting through these alerts quickly and prioritizing each network often. When it comes to managing these distributed
event by its severity and threat to the business. Using security organizational networks in a holistic manner, the SOC must
information management software, the SOC can provide support federated views and management roles. For example,
information that can aid an escalation process to handle the a subsidiary might report all data to the central SOC, but
resolution of an event, suppress repeat information, validate control for remediation might not be shared with the parent
alerts to confirm their impact, and prioritize the most critical organization. For the SOC to meet those parameters, security
alerts. information management tools must provide flexible role-based
views and accounts to accommodate these differing needs.
44 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
6.13.17 INTELLIGENT INTEGRATION operator in California. The administrator responds to a security
alert that showed someone improperly sending proprietary
WITH SOCS AND NOCS information out of the company. In just a few seconds, the user’s
access is blocked, the local operator is dispatched to remove
A SOC is an incredible business tool, but it should not work the user from the building, and an investigation into the incident
as an island. SOCs often live within or beside the NOC, and is initiated.
together these tools provide the statewide network and security
view that businesses need for maximum efficiency. Security Cost avoidance. Building the SOC will cost far less than not
events can be sent to the NOC from the SOC to communicate detecting, preventing, and responding to attacks.
the nature of incidents and provide additional intelligence for
Cost efficiencies. Many of the SOC processes or technologies
improved enterprise management. The NOC should have insight
can help automate functions already taking place within the
from the SOC so it can successfully respond to events and
organization. By accepting a new data feed and producing
administer security processes and services. This bi-directional
automated reporting, a SOC can often save the organization
communication is necessary for organizations to respond money by reducing manual effort.
efficiently and keep risk and damage to a minimum.
Cost sharing. Departments within the State either do not
monitor or rely on untrained individuals are tasked with the
6.13.18 THE SOC IN ACTION responsibilities outlined for the future SOC. Are those groups
willing to outsource these responsibilities to the SOC? Having
With the SOC gathering information, an organization can other organizations help to foot the bill can minimize the overall
respond quickly and effectively to security events and impact to all.
tthreats—even internal threats—in real-time. Consider the
following example: Revenue/Cost Recovery. SOC services can be offered to
all State departments. There is more work in determining
A security administrator at a company is in a room in Colorado separation of information among departments and other
that is lit by the glow of numerous monitors showing physical business aspects, but cost recovery can be leveraged to perform
areas of the campus. Each monitor displays data that is being security services for all state departments.
reported from the distributed geographic sites of the enterprise.
The administrator receives an alert on the main console, clicks
a button, and then picks up a phone and places a call to a local
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 45
6.13.19 MULTIPLE SECURITY OPERATIONS CENTERS
The current vision for the State’s new IT/IRM infrastructure is a combination of five Shared Service Centers (SSCs)
across five of the Hawai`ian islands (Oahu: two; Kauai: one; Maui: one; and Hawai`i: one).
Each of these Shared Service Centers will contain a manned security operations center to provide 7/24/365
rotational, proactive monitoring of the State’s infrastructure and data.
Figure 11: Shared Service Centers Vision for the State of Hawai’i
6.14 STATE OF HAWAI`I DATA PRIVACY PROGRAM • Organization for Economic Cooperation and
Development (OECD)
Data Privacy and IA are often confused as the same solution.
IA and CS are the tools, personnel, and monitoring, and data These laws sometimes conflict with the concept of open data;
privacy is the result. it is therefore imperative that any policies, procedures and
standards developed as an IA and CS solution take privacy and
There are various U.S. state and international laws which govern open data initiatives into consideration.
the disclosure of personal, private, or financial information to
individuals who do not have the need to know that information More details on the IT/IRM Privacy compliance are available in
to properly perform duties associated with their daily work: the IT/IRM Privacy Plan.
46 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
7 ASSUMPTIONS
8 CONSTRAINTS
9 INFORMATION ASSURANCE AND CYBER SECURITY INITIATIVES
10 GUIDANCE FOR PROGRAM MANAGERS AND PROJECT LEADS
11 CONCLUDING REMARKS
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 47
7 ASSUMPTIONS
In the development of the Plan, the following assumptions were made:
• A Enterprise Risk Management philosophy and processes will be put into place.
• An IA and CS Program Management Plan will outline the details of the necessary infrastructure
to implement a SecaaS model successfully.
• The CIOC and government support will prioritize resources (staff and budget) to support the recommendations of the Plan.
• An Information Assurance and Cyber Security Division will be created under the State’s CIO, led by a CISO.
• Each state department (and attached agencies where applicable) will designate a Department Information Security
Officer as a primary point of contact for issues, concerns, and projects related to IA and CS.
Development of the Plan and implementation of its recommendations are long-term objectives that will continue
to be refined through progressive elaboration. As IT Security is a constantly evolving field, the Plan will be updated
continuously to reflect changes.
The concepts and strategies identified in the Plan will remain true barring additional requirements and mandates that
may affect the Plan.
Implementation of the recommendations set forth in the Plan will not completely eliminate risk; this is not possible.
The intent of the Plan is to reduce risk to an acceptable level. Residual risk will be manageable and should be acceptable
if the recommendations of the Plan are adopted.
8 CONTRAINTS
In the development of the Plan, the following constraints were recognized:
• Magnitude of the effort. The creation of the Plan encompasses a vast number of technologies and
requirements along with associated risks and is bound by the following scope constraints:
• Resources. As with any effort, staffing and budget concerns must always be considered.
The development of the Plan is bound by the following resource constraints:
• Implementation Challenges. Implementation of the Plan will require a great deal of effort and cooperation
to achieve the level of security desired and is bound by the following implementation constraints:
48 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
9
INFORMATION ASSURANCE
AND CYBER SECURITY INITIATIVES
In preparing the Plan, the IA&P-AWG team evaluated legislated requirements, prior studies and planning documents,
department and organizational commitments, best practices, and the experience and knowledge of the team members
to build a list of prioritized initiatives; a strategy that will help focus State’s improvement efforts.
Detailed descriptions of the initiatives are in “Appendix A - Information Assurance and Cyber Security Program Strategic
Investment Initiatives”
10
GUIDANCE FOR PROGRAM
MANAGERS AND PROJECT LEADS
Each project initiated will adhere to the following tenants, goals, and objectives:
• Acquire and implement common enterprise security tools to maximize cost reductions with economies of scale.
• Technologies, tools, and solutions must—to the maximum degree possible—be able to be integrated in a fashion
that provides automated enterprise-wide visibility into the security posture of State’s information and information systems.
• Standardization decisions will be formally documented and the resulting standard, or specific product in cases where
there are no standards-based solutions available, will be incorporated into the State’s Enterprise Architecture Technical
Reference Model (TRM).
• Consideration should be given to leveraging and integrating existing investments to the greatest extent possible to conserve
available constrained budgetary resources.
• Solutions should not be conceived in a vacuum or stovepipe fashion where consideration is given towards addressing a single
risk or requirement. The way other solutions collectively help to mitigate that risk while also effectively contributing towards
mitigating a variety of other risks to achieve the greatest cost efficiency possible are factors.
• To achieve progress in a timely manner and to develop and maintain appropriate levels of expertise and support for each
enterprise initiative, the Centers of Excellence (CoE) concept should be implemented. The CoE concept should be inclusive
of the departments, divisions, and branches to participate in the incorporation of their respective requirements, vetting of all
requirements, and majority consensus approach towards selecting the final solutions to include involvement in the testing and
evaluation processes that result in formal standardization decisions incorporated into the TRM.
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 49
11 CONCLUDING REMARKS
Under the leadership of OIMT, the IA& P-AWG has prepared this document that recommends both a strategic and tactical
approach to IT security improvements that address many of the systemic weaknesses of the State’s security posture while
recognizing the technical, financial, and cultural needs of State’s organizational subcomponents.
In preparing the Plan, the IA&P-AWG evaluated legislated requirements, prior studies and planning documents, department and
organizational commitments, industry best practices, and the experience and knowledge of team members to build a list of
prioritized initiatives—a strategy—that will help to focus improvement efforts.
By adopting the recommended initiatives identified, the State’s security posture can be significantly improved. Initiatives have
been prioritized by the IA&P-AWG to provide the greatest immediate benefit to State. All of the recommended initiatives
represent significant investments of both capital and human resources; however, the benefits derived in implementing these
initiatives greatly outweigh the potential risks associated with damage to State’s reputation, mission activities, and public trust.
50 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
APPENDIX A -
INFORMATION ASSURANCE AND CYBER SECURITY
PROGRAM STRATEGIC INVESTMENT INITIATIVES
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 51
APPENDIX A -
INFORMATION ASSURANCE AND CYBER SECURITY
PROGRAM STRATEGIC INVESTMENT INITIATIVES
A summary of each program investment is provided below that includes:
• The investment priority as determined by the Information Assurance Working Group; and change the last sentence on the
page to read: “Risk information has been redacted for security concerns and cost estimates are not included as they are
• pending review.”
• Summary description
• Maturity levels
• Performance periods
For ease of distinguishing the types of investment initiatives, the tables are color-coded:
Risk-specific details have been redacted for security concerns and cost estimates are not included as they are pending review.
52 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
Table 11 – Description of Investment Initiatives Tables
Investment Name: 1
Funding Source: 6
Summary Description: 7
9 10
Legend
1. Investment Name—title of investment used for tracking purposes
2. Priority—level of priority:
• TBD: to be determined
3. Risk Assessment: Likelihood—how likely an event would occur if without the benefit of the protection of the investment.
4. Risk Assessment: Impact—the impact an event will have on the State’s infrastructure and data if the investment
is not implemented
5. Current Maturity Level—the maturity level currently implemented within the state.
8. Risk—description of the risk to the states computing infrastructure and data if the investment is not implemented.
9. Level of Control: Performance Period—the expected timeframe to architect, invest, implement, and operate
the level of control.
10. Level of Control: Cost Estimate—cost estimate based on data gathered from vendors or previous state implementation
for the level of control described and the period of performance. These costs include the hardware, software, consultant
assistance and maintenance costs over the Performance Period.
11. Estimated Total Cost—total cost estimate for the investment, over the lifetime of the Business and IT/IRM Strategic Plan21
(ten-year period). Industry best practices indicate that IA and CS budgets be based on eight- to ten-percent of the annual
total IT budget spending. These estimates also take into consideration the economies of scale by engaging vendors with
statewide enterprise-level purchases/licensing agreements; a cost savings across all State departments can be achieved.
21
These costs do not reflect the precise cost of the investment and are given in 2012 dollars. They do not reflect changes in inflation nor do they reflect
FTE expenses to implement and operate the investment, and will be subject to change when the investment is released for a Request for Proposal.
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 53
Investment Name: Network Data Loss Prevention (nDLP)
Summary Description: This investment implements a system to protect Personally Identifiable Information (PII) and
other sensitive data from inadvertently leaving State’s network without authorization or other appropriate protections.
54 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
Investment Name: IT Security Policy Assistance
Summary Description: This investment will support the development and promulgation of revised policies better articulating
the responsibilities of organizational components to more effectively manage their IT security programs, internal security
configurations and risks.
Assist state with development, review and implementation of a common set of FY 2012–13
security policies, guidelines, standards and procedures. (Dependencies: None)
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 55
Investment Name: Network Data Loss Prevention (nDLP)
Summary Description: This investment protects data stored on state owned mobile devices by allowing state employees
traveling overseas to use devices with no state data stored on them permanently.
56 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
Investment Name: Data-at-Rest (DAR) Encryption
Summary Description: This investment protects data resident on assets outside of the physical protection boundaries of State’s
facilities – typically resident on mobile devices that can be lost or stolen.
DAR encryption solution implemented on all removable media (USB, Optical, FY 2014–23
Magnetic, etc.) containing persisting sensitive information.
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 57
Investment Name: Critical Infrastructure Risk Assessment
Summary Description: Hire a respected third party organization to perform security audits to determine security baseline
across all state departments and identify gaps in security.
Review study and develop plan of action and milestones (POA&M) FY 2013
58 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
Investment Name: Server Configuration Stability Monitoring
Summary Description: This investment helps identify alterations in operating system, database, applications and
security configurations that result in State’s assets being more susceptible to threats.
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 59
Investment Name: Media Disposal and Destruction
Summary Description: Purchase device(s) or a service to destroy media containing state sensitive or personal data.
60 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
Investment Name: Information Assurance and Cyber Security Professional Training
Summary Description: Provide training and certification resources for IA and CS Division and DISOs.
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 61
Investment Name: Enterprise Domain Name Service Security (DNSSEC)
Summary Description: A set of extensions to DNS that provide to DNS clients (resolvers) origin authentication of DNS data,
authenticated denial of existence, and data integrity.
FY 2013–23
Initial Training & Certification Testing
FY 2013–23
Certification Maintenance
62 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
Investment Name: Enterprise Domain Name Service Security (DNSSEC)
Summary Description: Provide means to secure, trusted communications between multiple entities across unsecure public
networks using public/private cryptography key pair.
FY 2013
Pilot Implementation of PKI and Certificate Authority technology within ICSD
(Dependencies:
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 63
Investment Name: Automated Compliance Monitoring and Reporting
Summary Description: This investment helps identify alterations in security configurations that result in State’s assets
being more susceptible to threats.
FY 2013-16
Implemented continuous monitoring of security configurations on ICSD servers.
(Dependencies:
Implementation of the
IRM Asset Discovery
and Inventory
solution)
64 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
Investment Name: Personally Owned Remote Device OneNet Access
Summary Description: Allow personally owned devices, (desktops, laptops, iPhone, iPad, Android tablets, etc.) access into state’s
IT Infrastructure, while still providing secure communications between the mobile device and state owned systems.
FY 2013
Initial pilot project to include two-three state departments totaling no more
than 500 mobile devices (one-time cost)
Citizen access to OneNet for access to public and private cloud services FY 2015-23
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 65
Investment Name: Personal Mobile Device Management
Summary Description: Remotely manage personally owned mobile devices to allow for secure communications between
the device and the State’s network, systems and applications.
FY 2013
Initial Pilot project to include 2-3 state departments totaling no more than 500
mobile devices (one-time cost)
Department wide implementation and support (max 25,000 mobile devices) FY 2014–23
66 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
Investment Name: Enterprise Security Operations Center(s)
Summary Description: This investment supports State’s ability to monitor threats presented by data loss from
mission critical systems resulting from miss-configurations or unauthorized data transfers initiated by malicious actors.
FY 2013–23
Implemented virtual capability for security event and incident monitoring,
(Dependencies: None)
detection, reporting and response activities at Department level.
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 67
Investment Name: Computer Security Incident Response Team (CSIRTs)
Summary Description: This investment improves computer incident detection, reporting, prioritization, response, collaboration,
and resolution capabilities throughout the Department.
68 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
Investment Name: Enterprise Penetration Testing Capability
Summary Description: This investment will define, document, and implement a core capability enabling State to assess the
effectiveness of security controls, when evaluated from an attacker’s perspective, to deny the compromise of mission critical systems.
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 69
Investment Name: Common Standards for Protecting Privacy and Other Sensitive Data
Summary Description: This investment will fund the development and promulgation of common standards for protecting
privacy and other sensitive information.
70 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
Investment Name: Secure Application Testing Program
Summary Description: This investment develops and implements solutions and testing regimens within application lifecycle
development processes to help identify vulnerabilities and weaknesses in all custom source code (Forge.mil and RDE&T model).
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 71
Investment Name: Enterprise Identity and Access Management
Summary Description: This investment develops and implements a strong logical authentication for network logon
and in addition supports the use of those credentials for application logon, digital signatures, and encryption.
Account management processes and solution are defined, documented and FY 2014–23
integrated with the Enterprise Directory Services (Active Directory (AD)) and (Dependency:
associated AD Operational Standardization; and all end-user computers are Implementation
routinely monitored for unauthorized password changes to local accounts and of single state AD
unauthorized changes to local user groups. infrastructure)
72 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
Investment Name: Network-based Access Control (NAC)
Summary Description: This investment will implement a network-based solution to prevent unauthorized systems
from inappropriately accessing State’s network(s).
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 73
Investment Name: Network Security Upgrade
Summary Description: This investment will implement a network-based solution to identify and automatically prevent
attacks targeting State’s networks and resources.
74 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
Investment Name: Secure Wireless Access Solution
Summary Description: This investment will support the selection, development, implementation, and migration to a standardized
statewide wireless access solution(s) for both remote and local area network access.
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 75
Investment Name: Data in Motion Encryption
Summary Description: This investment will support the design and implementation of secure internal network
communications between mission-critical servers and locations.
Implemented a common end-to-end encryption solution for the enterprise that FY 2013–14
encompasses all devices (desktops, laptops, mobile devices, workstations, (Dependencies: None)
servers, routers, etc.)
76 | State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan
Investment Name: Statewide User Education, Training, and Awareness
Summary Description: This investment enhances the department-wide IT security awareness and training program
utilizing more frequent and targeted offerings in order to increase the state of security at State through improved education.
Improved training program annually to better target reducing largest security- FY 2013–23
related incident types (Dependencies: None)
FY 2013–23
None)
State of Hawaii Business and IT/IRM Transformation Plan Governance | Information Assurance and Cyber Security Strategic Plan | 77