Title: Port ERPBCP Update
1Port of Redwood CityERP/BCP DevelopmentUpdate
Steve Longoria, CCP, CHS-III, CPM Security
Consultant Aanko Technologies Inc.
2AGENDA
- The Challenge of Security
- The Ingredients of an Attack
- Protection Framework
- ERP/BCP Highlights
- Ten Immutable Laws of Security Administration
3The Challenge Of Security
Ports face challenges from government mandates to
ensure their infrastructure and information
assets are secure, yet not impede the flow of
commerce.
- Provide services
- Wharves, Offices, Site Access, Security
- while protecting Port assets.
- Financial data, Infrastructure, network
resources, intellectual property, customer
information, waterways
47 Step Security Process
- Establish Security Team
- Perform a Security Assessment of I2
- Conduct a Risk Analysis for assets
- Design/implement Security Standards (FSP)
- Write an Organization ERP/BCP
- Implement ERP/BCP Training Awareness
- Perform Ongoing Security Management
5Why is Security so difficult?
- An attacker only has to find a single entry point
into the Port restricted areas-its own and its
tenants. You have to plan for and defend every
possible entry point - Persistence is their greatest weapon. Managing
Risk is your best defense - There is a delicate balance between the security
of a Port and its level of functionality/usability
6Why Do So Many Security Strategies Fail?
- Too loose or too restrictive policies
- Poor design, analysis and countermeasures to
security issues - Ignoring the problem or not giving proper
attention to potential security risks due to
politics or poor procedures
7The Ingredients of an Attack
Threat Motive Method Vulnerability ATTACK!
8Need for ERP/BCP Integration
9What are the Threats?
- The accidental mistake by an ignorant employee or
contractor can be a security threat as well and
must be planned for - Integration of ERP pre-disaster tools leverage
contigency planning techniques to mitigate
Natural disasters
10What are the Vulnerabilities?
- Port lacks security features
- Port still open
- Commerce not addressed by security mandates
Technology
Cracks in the protective wall
Planning, Policies procedures
The human factor
- Designing for security
- Roles responsibilities
- Auditing, tracking, follow up
- Continuity of staff assignments
- Staying up-to-date with security development
- Lack of Funding
- Lack of commitment
- Human error
11What are the Methods?
- Unauthorized R/A Access
- IT Viruses
- Bombs or Bomb Threats
- Arson
- E-mail impersonation
- Network eavesdropping
- Social engineering
- Environmental Damage
- Sabotage
- Theft
Just examples, many more methods possible
12Framework for Protection
Technology
Planning, Policies procedures
The human factor
13Prevention
- Avoid the problems before they happen
- Typically a proactive approach
- Will only guard against the attacks that could be
forseen - This is the area where technology is most helpful
- Example Must use personnel badging system to
access office areas
14Detection
- Detect the security breaches that are able to
overcome the prevention - Relevant both for the forseen and unforseen
security breaches - Can be both reactive and proactive
- Technology can help a lot, but this is a complex
area that requires a lot of intelligence and
awareness - It is vital to collect all evidence and document
all actions, if you want to prosecute later - Example Company badge with photo must be worn
when ever inside the company building
15Reaction
- Detection without reaction is meaningless! ERP
Initiation needed - Restore the Infrastructure, information or
service to normal operation BCP Initiation
needed - Learn from experience and improve security
update plans
16Defense In Depth
- Port-wide security design methodology of layering
defenses - Perimeter defenses
- Network defenses
- Security Education
- Security Maintenance
- Provides a method and framework for designing
security into infrastructure
17The 10 FacetsOf the Port ERP/BCP
- Plan Integration with NIMS/SEMS
- Emergency Response Quick Reference Guide
- Business Recovery Quick Reference Guide
- Basic Plan with Phased Emergency Use
- Before an Emergency (Preparedness)
- During an Emergency (Response)
- After an Emergency (Recovery)
- United States Coast Guard Maritime Security
(MARSEC) Integration (with FSP)
18The 10 FacetsOf the Port ERP/BCP
- Emergency Operations Center Activation
- Incident-Specific Response to Man-Made or
Technological Emergencies - Fire Response
- Bomb Threats and Explosions
- HAZMAT Spill/Release
- Electrical Power Outage
- Water Supply Interruption
- Suspicious Mail Handling
- Natural and Human Event Emergencies
- Restoration And Recovery Information
- Safety and Security Considerations
19Next Steps
Finalize ERP/BCP Staff Training Golden Guardian
Exercise 2005