BEACHWEAR CLOTHING
Vulnerability Assessment Report Recommendations for Improvements to Security Christine Cogswell 6/30/2014
This document is a vulnerability assessment as well as recommendations to improve the information security at Beachwear Clothing. It addresses Security policies, Business Continuity and the software currently in place.
Table of Contents Vulnerability Assessment Plan
................................................................. 3
Asset Identification ..................................................................................................................... 3 Threat Identification and Evaluation .......................................................... 4 Vulnerability Impact Scale ......................................................................................................... 4 Threat Evaluation- People ........................................................................................................... 4 Threat Evaluation-Physical ......................................................................................................... 5 Threat Evaluation-Data (outsourced) .......................................................................................... 5 Threat Evaluation -Hardware ...................................................................................................... 6 Threat Evaluation -Software ....................................................................................................... 6 Vulnerability Appraisal ......................................................................... 7 Baseline Security ......................................................................................................................... 7 Risk Assessment and Mitigation ................................................................ 8 People .......................................................................................................................................... 8 Physical ....................................................................................................................................... 9 Data ........................................................................................................................................... 11 hardware .................................................................................................................................... 12 Software .................................................................................................................................... 14 Passwords ....................................................................................... 15 Password policy settings ........................................................................................................... 15 Account lockout policy settings ................................................................................................ 16 Software Threats ............................................................................... 17 Security Policy .................................................................................. 18
...................................................................... 20 Recommendations .............................................................................. 21 Business Continuity Plan
Beachwear Clothing Vulnerability Assessment Report
1|Page
BEACHWEAR CLOTHING SECURITY CONCEPTS PROJECT SPECIFICATIONS Beachwear Clothing employs 108 people. The company’s headquarters is located on the fourth floor of a rented office building in Billerica, MA. Currently, there are 3 retail stores, one in Massachusetts, one in Rhode Island and one in Florida. Headquarters in Billerica, MA:
President: Chris Cogswell Vice-President: 1 Office Workers: 15
3 Retail Stores:
General Manager: 1 Store manager: 3 Retail Workers: 20 in each store
Sales Force:
Sales Reps: 15
Suppliers:
Suppliers: 10 in United States Supplier: 1 in Canada Supplier: 1in Mexico
Cloud Business Management Software Suite: NetSuite
Beachwear Clothing Vulnerability Assessment Report
2|Page
VULNERABILITY ASSESSMENT PLAN ASSET IDENTIFICATION
People Assets o President o Vice-President o Employees Office workers Store Managers Retail workers Sales Reps Cleaning staff (outsourced) Suppliers Celebrity spokesperson o Customers Physical Assets o Building o Inventory o Office furniture o Retail store assets (other than inventory) Data Assets o Accounting Records o Employee records o Customer records o Supplier records o Sales Rep records o Inventory records Hardware Assets o Office computers, network equipment, printers o Store computers, cash registers, printers o Sales Reps laptops o Sales Reps cellphones o Sales Reps Tokens o Pillar Checkpoint Security Towers o Super Tags Software Assets o Microsoft Office o Microsoft Security Essentials o NetSuite
Beachwear Clothing Vulnerability Assessment Report
3|Page
THREAT IDENTIFICATION AND EVALUATION VULNERABILITY IMPACT SCALE (CIAMPA, 2012, P. 129)
THREAT EVALUATION- PEOPLE People
Threat Example
Impact
Death Retirement
Significant
Office Workers General Manager Store Managers Retail Workers Sales Reps Cleaning Staff Suppliers Celebrity Spokesperson
Significant to Major
Customers
Theft Human Error Disgruntled Employee Not following security policies Unauthorized access Theft Going out of business Celebrity Spokesperson Scandal Theft –Minor (100)
President Vice-President
Small Impact Major Significant Small Impact Significant
Beachwear Clothing Vulnerability Assessment Report
4|Page
THREAT EVALUATION-PHYSICAL Physical
Threat Example
Impact
Building
Natural Disasters Fire Storms Power Outages Rent Increase Minor Increase Major Not able to renew lease
Significant to Catastrophic
Small Impact Major Significant
Catastrophic
Production stopped because of strike at supplier Shipping stopped because of strike from shipping company
Catastrophic
Minor theft by employees
Small Impact
Major theft by employees
Significant
Aging and outdated furniture Vandalism Theft Pillar Checkpoint Security Towers not working
Small Impact Small Impact to Significant
Inventory
Office Furniture Retail Store Assets (other than inventory)
THREAT EVALUATION-DATA (OUTSOURCED) Data-Outsourced Records: Accounting Records Employee Records Supplier Records Sales Rep Records Inventory Records
Threat Example
Impact
Major
Server Down Terrorist attack on Web Network Failures
Beachwear Clothing Vulnerability Assessment Report
5|Page
THREAT EVALUATION-HARDWARE Hardware
Threat Example
Impact
Breakage (Human) Breakage (Software) Theft
Significant to Catastrophic
Aging
Small Impact to Significant
Breakage (Human) Breakage (Software) Theft System Hacked Vandalism Aging
Significant to Catastrophic
Retail store computers Cash Registers Printers Pillar Checkpoint Security Tower Super Tags
Sales Reps iPads Sales Reps cellphones Sales Rep Tokens
Breakage (Human) Breakage (Software) Theft
Significant to Major
Aging
Small Impact to Significant
Office Computers Network equipment Printers
Small Impact to Significant
THREAT EVALUATION-SOFTWARE Software
Threat Example
Impact
Significant to Major
Application Programs Email Microsoft Office 2013 Microsoft Security Essentials
Software attacks from virus, worms, DOS, spam, spyware and malware Software failure or errors Technical obsolesce Unauthorized users
Beachwear Clothing Vulnerability Assessment Report
6|Page
VULNERABILITY APPRAISAL BASELINE SECURITY
Asset
Baseline Security in Place
People
Passwords Screensavers Badges Tokens
Building Billerica
Badges for employees to enter building President and Vice-President Office’s key locked Fire Extinguishers Sprinkler Systems Backup Generators Security Cameras
Retail Stores
Manager Office key locked Fire Extinguishers Sprinkler Systems Backup Generators Pillar Checkpoint Security Towers Super Tags 2 Security Cameras
Data (outsourced) Hardware
All data is outsourced to NetSuite Power Strips Locked cabinet (for Super Tags)
Software
Scheduled downtime for maintenance, upgrades and updates Virus protection
Beachwear Clothing Vulnerability Assessment Report
7|Page
RISK ASSESSMENT AND MITIGATION Risk can never be totally eliminated, but can be minimized by the application of IT security controls. The decision as to what level risk will be accepted will be based on management review of the identified IT security controls needed to mitigate risk versus the potential impact of implementing those controls on available resources and system operations. The Risk Assessment identifies the current level of risk for the application and provides risk mitigation recommendations for management review (DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT, n.d.) . PEOPLE Asset
Vulnerability
Risk Mitigation
President and Vice-President
Accident resulting in death or injury of President and Vice-President traveling together President or VicePresident retires Security breach because of weak passwords
President and Vice-President should never Diminish travel on the same airplane
All Employees
Not following security policies
Employee leaving job Injury on the job Retail Workers
Sales Reps
Theft of bathing suits or accessories from store Broken, lost or stolen tokens Broken, stolen or lost iPads/laptops
Diminish Transfer Accept
Plan to interview possible candidates six months prior to retirement Enforce stronger password *See: Password Policy Settings and Account Lockout Policy Settings tables for parameters Conduct security education training for new employees and mandatory follow up training every six months for all employees Access to all systems immediately revoked. Accounts, passwords, badges deleted or disabled. Key locks changed. OSHA training Insurance Mandatory bag check whenever an employee leaves the store
Diminish
Insurance coverage which includes device replacement and 24/7 technical support Insurance coverage which includes device replacement and 24/7 technical support. Passwords on all devices.
Transfer
Beachwear Clothing Vulnerability Assessment Report
Diminish
Diminish
Diminish
Diminish Transfer Diminish
Transfer Diminish
8|Page
Sales Reps
Celebrity Spokesperson Customers
Cleaning Staff (outsourced) Suppliers
Broken, lost or stolen cell phones
Insurance coverage which includes device replacement and 24/7 technical support. Passwords on cellphones. Scandal resulting Require celebrity to sign a morals clause in damage to brand as part of contract Theft of bathing Pillar Security Checkpoint Towers suits or accessories installed at exits and Super Tags installed from store on all items costing over $25.00 Install 6 additional security cameras in each store Loss prevention training for new employees and mandatory follow up training every six months for all employees Customer Offer coupons, incentives and rewards. dissatisfaction from results of store closing, fire, natural disasters, etc. Theft of bathing Security cameras. suits or accessories from store Supplier going out Add 3 additional suppliers to business. of business
Transfer Diminish Diminish Diminish and Accept Diminish Diminish
Diminish
Diminish
Diminish
PHYSICAL Asset
Vulnerability
Risk Mitigation
Diminish Transfer Accept
Building
Natural Disaster causing the office space in Billerica shut down. Any disaster resulting in employees leaving the building Fire Fire causing the office space in Billerica shut down
Insurance and Cold-site contract with Building owner
Transfer Diminish
Conduct employee safety and fire awareness training and drills
Diminish
Fire and Sprinkler Systems Fire Insurance and Cold-site contract with Building owner
Diminish Transfer Diminish
Beachwear Clothing Vulnerability Assessment Report
9|Page
Water and smoke damage from fire Power outage
Inventory
Retail Store Assets (other than inventory)
Office Furniture
Fire Insurance
Transfer
Back-up generators
Diminish
Minor rent increase Major rent increase Look for other building rentals and compare costs. Building owner Immediately employ reputable realtor to will not renew secure another rental building. Begin lease at end of planning on transfer of employees and term equipment. No product Have contracts for products from 5 because of a strike additional suppliers at suppliers business No product Insurance because of fire and water damage Loss of inventory Add 5% additional inventory to each from theft order to make up for the loss Broken windows Insurance and from vandalism Security cameras outside of stores
Accept
Manikins damaged from vandalism Pillar Checkpoint Security Towers not working Employees stealing office supplies Employees have no pride in their surroundings because of aging and outdated office furniture and may lead to having no pride in their work.
Insurance and Security cameras Fix or replace with new towers. Purchase extended warranty
Transfer Diminish Transfer
Security cameras installed in office and back rooms of retail store.
Diminish
Every year put money in the budget to replace the oldest office furniture.
Accept or Diminish
Beachwear Clothing Vulnerability Assessment Report
10 | P a g e
Accept Diminish
Diminish
Transfer
Accept Transfer Diminish
DATA Asset
Vulnerability
Risk Mitigation
Diminish Transfer Accept
Data on computers, laptops, iPads and cellphones
Attackers discover and compromise covered data on devices that are not secured against vulnerabilities Overly permissive default configuration settings provide an attacker with the ability to access data without authorization Attackers use and deploy malicious software to gain unauthorized access to systems and sensitive data. Data is compromised, lost, stolen or managed incorrectly resulting in security breach
Automate daily vulnerability testing. Generate alerts and escalate visibility of critical vulnerabilities within 48 hours. Compare prior scans to verify that vulnerabilities are addressed. Secure device configurations
Diminish
Allow installations of software packages required for business purposes only
Diminish
All data is outsourced to NetSuite
Transfer
Data from HR, accounting, customer accounts, and supplier accounts
Beachwear Clothing Vulnerability Assessment Report
Diminish
11 | P a g e
HARDWARE Asset
Vulnerability
Risk Mitigation
Diminish Transfer Accept
Equipment failure
Purchase extended warranty and 24/7 tech support
Transfer
Aging and outdated devices running slow or not able to handle newer software Unauthorized use of equipment
Every year put money in the budget to replace the oldest devices.
Diminish
Restricted areas clearly marked for authorized personnel only. Employee training about authorization policies UPS and Back-up generators
Diminish
Insurance
Transfer
Schedule weekly maintenance Log all print jobs
Diminish Diminish
Set security configurations based on industry standards
Diminish
Purchase a maintenance and extended warranty contract with 24/7 tech support
Transfer
Office Computers Retail Store Computers Network equipment Printers
Power loss resulting from storm or natural disaster Equipment stolen
Cash Registers Pillar Checkpoint Security Tower Super Tags
Device sluggish Unauthorized printing of documents Device default configuration setting provide attacker with ability to access data Cash Registers and Pillar Checkpoint stop working
Beachwear Clothing Vulnerability Assessment Report
Diminish
12 | P a g e
Sales Reps iPads and laptops Sales Reps cellphones Sales Rep Tokens
Super Tags not working Super Tags stolen Outdated equipment Equipment vandalized
Purchase extended warranty
Transfer
Keep in locked cabinet Every year put money in the budget to replace the oldest devices. Insurance
Diminish Diminish
iPads, laptops or cell phones dropped and broken
Purchase a maintenance and extended warranty contract with 24/7 tech support
Transfer
iPads, laptops or cell phones hacked iPads, laptops, cell phones, or token stolen Token not working
Use encryption, passwords, employee Diminish security training, and antivirus programs. Insurance and Transfer Remote Wipe Software with GPS tracking Diminish
Purchase a maintenance and extended warranty contract with 24/7 tech support Outdated iPad does Replace with new not work well with newer software Portable media lost Require passwords and encryption on all or stolen portable media
Beachwear Clothing Vulnerability Assessment Report
Transfer
Transfer Accept or Diminish Diminish
13 | P a g e
SOFTWARE Asset
Vulnerability
Risk Mitigation
Diminish Transfer Accept
Software attacks from virus, worms, DOS, spam, spyware and malware
Purchase Antivirus protection with 24/7 tech support
Transfer
Zero-day attacks, hacker attacks, data interception and theft Software security breach, failure or errors Software modified intentionally to bypass security Outdated software is unsecure Employee opens an infected attachment
Firewall, Anti-virus software, Intrusion prevention systems
Diminish
Schedule weekly maintenance, patches and security updates
Diminish
Firewall, Anti-virus software, Intrusion prevention systems Replace or upgrade
Diminish
Conduct security education training for new employees and mandatory follow up training every six months for all employees
Diminish
Employee attacked by social engineering
Conduct security education training for new employees and mandatory follow up training every six months for all employees Apply group policy and set user access level
Diminish
Application Programs Email Microsoft Office 2013
Unauthorized user accessing application
Diminish
Diminish
* Refer to Department of Housing and Urban Development table .for additional threats and potential impacts
Beachwear Clothing Vulnerability Assessment Report
14 | P a g e
PASSWORDS PASSWORD POLICY SETTINGS (CIAMPA, 2012, P. 386)
Beachwear Clothing Vulnerability Assessment Report
15 | P a g e
ACCOUNT LOCKOUT POLICY SETTINGS (CIAMPA, 2012, P. 387)
Beachwear Clothing Vulnerability Assessment Report
16 | P a g e
SOFTWARE THREATS
√
Unauthorized Modification Unauthorized Disclosure
Description
Denial of Service Destruction
Software Threats and Potential Impacts (DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT, n.d.)
√
√
√
√
√
√
√
√
√
√
Program Errors/ Software malfunction or failure resulting from insufficient configuration controls (i.e., testing Software new releases, performing virus scans). Failure
√
Hacking/ Social Engineering
Software may be modified intentionally to bypass system security controls, manipulate data, or cause denial of service. Social engineering used by a hacker to gathers data for use in modifying or manipulating the system.
√
Malicious Code
Malicious software such as viruses or worms may be introduced to the system, causing damage to the data or software.
√
User Errors/ Omissions
Application and support system components may be inappropriately modified or destroyed due to unintentional administrator or user error.
√
Browsing/ Disclosure
Intentional unauthorized access to confidential information by outsiders or by personnel with system access but not having a need to know
√
Eavesdropping/ interception
Intentional unauthorized access to confidential information through technical means (sniffing/interception) or by personnel having some level of system access but not having a need to know (eavesdropping)
√
Data Integrity Loss
Attacks on the integrity of system data by intentional alteration.
Misuse/Abuse
Individuals may employ system resources for unauthorized purposes.
√
√
√
√
Program Errors/Software Failure
Software malfunction or failure resulting from insufficient configuration controls (i.e., testing new releases, performing virus scans).
√
√
√
√
√
Beachwear Clothing Vulnerability Assessment Report
17 | P a g e
SECURITY POLICY
Development team representatives for Security Policies o Senior level administrator and member of management who can enforce the policy Create a written security policy for all employees and presented at orientation session after employee is hired. Includes plans to protect the company's physical and information technology (IT) assets. Acceptable use policy o Defines actions users may perform while accessing systems Employees agree to abide by the Internet code of behavior policy which includes the following: Email/texting only business related content Wireless communication policyo Employees agree to have any BYOD approved by the security manager Screensavers and Passwords policy Screensavers set for 15 minutes of inactivity or employee will run the screensavers if device is left unattended Privacy policy o Outlines how organization uses personal information it collects Company will not give any personal information unless agreed to in writing by employee o Outlines how an employee uses companies information Employees agree to not divulge any company information or other employee information and sign a confidentiality contract Security-related human resource policy o Presented at employee orientation session after employee is hired o Actions to be taken when employee is terminated All passwords and accounts are immediately disabled Employee is escorted out of the building by security All devices are immediately confiscated Password management and complexity policy o Standards of password creation Change passwords every 60 days Password must be at least 12 characters and have uppercase, lowercase and non-alphabetic characters Account lockout after 5 failed attempts Disposal and destruction policy o Addresses disposal of confidential resources Paper records containing confidential information must be shredded Electronic or machine-readable records containing confidential information require a two-step process. Deletion of the contents of digital files and emptying of the desktop recycling bin Beachwear Clothing Vulnerability Assessment Report
18 | P a g e
Commercially available software applications used to remove all data from the storage device. A destruction record describing and documenting any data or physical device destroyed, who authorized the destruction, as well as the date, agent, and method of destruction. Awareness and Training Policies o Security, loss prevention, disaster education o Training and drills Hardware Security Policy o Laptops, computers, cellphones, flash drives, and iPads Computer Tokens for remote access Passwords and screensavers Remote Wipe Software with GPS tracking Disposal and destruction policy of equipment Software Security Policy o Group policy setting in place including Application access protocols implemented by security setting access control limits for each employee using role based access control o Network Security Guidelines All sales reps will use Virtual Lans to access company data All in one network security appliances used to provide the following: Virus protection, anti-spyware, content filtering, encryption, firewall, intrusion protection and web filtering Cleaning Crew Security Policy o Background checks/CORI
Beachwear Clothing Vulnerability Assessment Report
19 | P a g e
BUSINESS CONTINUITY PLAN Business continuity planning and testing is required in order for Beachwear Clothing to maintain operations and services in the face of a disruptive event.
Disaster Recovery Plan o Request Disaster Recovery Plan from XXX. Ensure plan includes data backup, fault tolerances and security encryption Emergency Response Plan Preparedness Policy o Assign roles for emergency response Crisis Communication plan and incident management plan o Customers Clearly mark exit signs o Employees Fire drills and procedures Training and Testing o Train personnel; clarify roles and responsibilities o Reinforce knowledge of procedures, facilities, systems and equipment o Improve individual performance as well as organizational coordination and communications o Evaluate policies, plans, procedures and the knowledge and skills of team members o Reveal weaknesses and resource gaps Monitor and document security incidents Document external contacts Document critical equipment and software Identify contingency location Security reassessment every 6 months Review and Revise as needed
Beachwear Clothing Vulnerability Assessment Report
20 | P a g e
RECOMMENDATIONS Physical facility:
Set up a cold-site contract Install backup generators in all retail stores and office building Install UPS
Computers, Printers, Laptops:
Budget for replacement for aging computers, laptops, iPads, cellphones and storage devices Install software program on all portable devices (phones, laptops) that can remotely wipe and disable the device Budget for encrypted thumb drives
Network and Data:
Set up VPN to replace Remote Desktop for employees working remotely Install all in one security appliance Install Intrusion Detection Software Contract with company to do yearly penetration testing Protect unused ports on servers by blocking them or change default ports used by most programs to make it more difficult to hack Invest in multiple virus software or contract with company to provide those services Schedule weekly maintenance, patches and security updates
Employee Training:
Mandatory OSHA training Conduct security education training for new employees and mandatory follow up training every six months for all employees
Retail Store:
Purchase locked cabinet to store supertags Install additional security cameras in backroom, on sales floor and outside of building
Beachwear Clothing Vulnerability Assessment Report
21 | P a g e
References Anti-Theft Retail Store Security Equipment, Shoplifting Loss Prevention, Security Tags. (2014). Retrieved from http://www.sensortags.com/ Business Continuity Plan. (2012, December 19). Retrieved from http://www.ready.gov/business/implementation/continuity Ciampa, M. D. (2012). Security guide to network security fundamentals. Boston, MA: Course Technology, Cengage Learning. Continuous Vulnerability Assessment & Remediation Guideline. (2013, July). Retrieved from https%3A%2F%2Fsecurity.berkeley.edu%2Fcontent%2Fcontinuousvulnerability-assessment-remediationguideline%3Fdestination%3Dnode%2F398 DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT. (n.d.). Retrieved from http://hud.gov/offices/adm/hudclips/guidebooks/2400.25G/240025g4RATem pGUID.pdf NetSuite. (2014). Retrieved from http://www.netsuite.com/portal/products/netsuite.shtml OSHA Directorate of Training and Education. (2014). Retrieved from https://www.osha.gov/dte/index.html Program Management. (2013, May 2). Retrieved from http://www.ready.gov/programmanagement
Beachwear Clothing Vulnerability Assessment Report
22 | P a g e