Operational and Organizational Security

Operational and organizational security covers a variety of topics such as setting security policies for the entire organization, user training and awareness, risk assessment, physical security of the equipment, privilege management, and implementing a backup and recovery plan. The sole purpose of implementing organizational and operational security is to ensure a safe and secure working environment where users know what is expected from them, and management has the guidelines to respond to unexpected situations in order to maintain business continuity. The sections that follow cover the concepts of some of the main areas of organizational and operational security.

Physical security involves keeping the network equipment, computer hardware, and software secure from unauthorized access. This includes having appropriate access control systems in place, training the users to protect them from social engineering, and maintaining a perfect operating environment for the equipment. Each component of the business network is vulnerable to different types of external and internal threats. It is important that physical security be given priority while designing and implementing security policies.

The following sections explain how physical security can be ensured by taking care of access control, implementing physical barriers, and controlling environmental factors.

Preventing unauthorized access to critical network equipment is meaningless if the environmental factors are ignored. The environment surrounding the network equipment includes temperature, humidity, electrical interference, and airflow, among other factors. Equipment should be operated within acceptable limits of temperature and humidity. Server rooms especially should be equipped with temperature and humidity control systems. An increase in temperature inside a computer leads to a defect known as chip creep or socket creep. It makes computer chips loose in sockets. The following are some of the measures to protect against environmental factors:

Disasters can come at any time and in any form. It may be a fire, a flood, or a terrorist attack, or it may even take some other unknown form. A disaster recovery plan should take into account all possible kinds of internal and external threats. It is important to make necessary plans to protect the critical data from any such events in order to let the organization recover in a minimum amount of time and resume its business as soon as possible.

Data backup methods, secure recovery of data, and a well-designed and documented disaster recovery and business continuity plan should be in place. The disaster recovery plan should not wait for a real disaster to occur.

Data backup is one of the fundamental elements of a disaster recovery plan. Backed-up data is copied to another media such as magnetic tapes or compact disks (CDs or DVDs), which are safely and securely stored at an offsite location. The administrators must decide what data is to be backed up and what should be the frequency, depending on the volume of the backup data and the requirements of an organization. Commonly used backup methods include the following:

Most organizations implement a mix of one or more backup types to create weekly, monthly and yearly backup plans. Depending on the requirements of an organization and the amount of data to be backed up, different organizations may adopt different backup schemes. The combination of full backup on weekends and incremental backups on weekdays is one of the commonly used methods.

The secure recovery of data is a part of the backup process. Data may need to be recovered from backup tapes, even when a small incident such as accidental deletion of files happens, or when some virus application corrupts files. The damage may occur on a single system or on multiple systems across the network. Administrators should also not forget that the organization might be subject to outside malicious activity by professional hackers. The worst-case scenario is a disaster that requires administrators to carefully make a disaster recovery plan and define procedures for secure and quick restoration of data.

The safety of backup tapes is of prime concern. This includes protecting the tapes from physical damage and theft. Aside from this, procedures and guidelines must be in place to describe how the data can be restored with minimal delays. Large organizations usually have dedicated backup operators who are proficient in backup and restoration functions. Offsite storage is an excellent way to secure tapes. Large organizations can also have alternate sites, which can be used to resume business in case of a disaster.

A business continuity plan is a written document that defines the major threats that a company may face, including disasters, and sets up policies and procedures to ensure that the business resumes with minimum delays after an interruption due to any unforeseen circumstances. This plan is developed after a careful assessment of risks and the impact of each type of disaster and event. Essential elements of a business continuity plan are as follows:

High availability refers to maximum uptime as well as efficiency of the systems and the network. It can be achieved only if there are adequate arrangements in place to maintain network services in case of a system failure. Network load balancing is a common method used to share the load of requests for a particular service such as a web server or a DNS server. Server clustering is another method to ensure high availability. As far as a single server is concerned, most of the system crashes are caused by failure of hard disks. Server hardware addresses the problem of hard disk failures by implementing a Redundant Array of Inexpensive Disks (RAID), also known as fault-tolerant disks. Servers equipped with RAID systems normally allow hot swapping of hard disks so that the server does not need to be taken offline when a failed disk is to be replaced. The following types of fault-tolerant RAID systems are commonly used:

RAID systems can be either hardware- or software-based. Hardware-based systems are more expensive but more efficient than software RAID systems. Software RAID systems are implemented using the network operating system. They have limited functionality and are used only where the cost of implementing a RAID system is to be kept to a minimum.

Security policies and procedures are sets of written documents that describe how a safe and secure computing environment is to be created and maintained inside an organization. The following sections explain some of the security policies and procedures covered in the Security+ exam.

Privilege Management involves administrative tasks that control access to the shared network resources. Access control allows administrators to assign access permissions for internal and external users. In most cases, the access to resources is based on job functions of users or groups of users. In this section, we will summarize some basic concepts behind privilege management to ensure security of the organizational data and other network resources.

Computer forensics is the application of computer expertise and skills to establish factual information about an incident for a judicial review. It involves activities such as collecting and preserving evidence, examining evidence, and transferring it using electronic media. Presentation of evidence is also considered an aspect of this. Computer forensics is done using a method that adheres to standards of evidence that are acceptable in a court of law. It is important that these standards are followed to collect and preserve evidence so that it is not damaged in a way that lawyers may argue its validity and the judges may consider it inadmissible.

It is important that users are made aware of the consequences of incidents that may lead to criminal investigations. If there is some incident that is considered a criminal activity, it should be reported to the incident response team. This team follows the incident response policy of the organization in order to deal with the incident. Each person on the incident response team has a specific role. Criminal investigations consist of people performing the following activities:

Educating and training users is one of the important aspects of creating a safe and secure working environment. Organizations may go for in-house training or can hire a professional training company to provide training to users. This is an ongoing process, especially when new equipment is installed or a new application is implemented. This training applies to employees of all departments of the organization.

Risk Identification is the process of identifying assets, risks, threats, and vulnerabilities in a system. A risk is the possibility of incurring some loss due to unexpected situations. It is the possibility of certain loss and does not necessarily mean that loss will occur. For example, a disaster such as a fire or a flood can potentially cause a heavy loss to an organization in terms of lost business and lost clientele. Risks can be caused by internal or external sources. It is necessary that all forms of risks are evaluated and that threats from these risks be identified.