<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Implementing Separation/Segregation of Duties in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Implementing-Separation-Segregation-of-Duties/m-p/29303#M1893</link>
    <description>&lt;P&gt;Over in the &lt;A href="https://community.isc2.org/t5/Career/bd-p/Career" target="_blank" rel="noopener"&gt;Careers area&lt;/A&gt; we had a thread kicked off by &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/329543157"&gt;@Lamont29&lt;/a&gt;&amp;nbsp;on the issues of differences in &lt;A href="https://community.isc2.org/t5/Career/Separations-of-Duties/td-p/12004" target="_blank" rel="noopener"&gt;career tracks in information technologies and information security&lt;/A&gt;, which spawned a second discussion on the &lt;A href="https://community.isc2.org/t5/Career/Insider-Threat-Protection-with-Separation-of-Duties/td-p/13183" target="_blank" rel="noopener"&gt;principle &amp;nbsp;of separation or segregation (SoD) of duties&lt;/A&gt;. Mouli&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/637665353"&gt;@iluom&lt;/a&gt;&amp;nbsp;asked me a good question there on how to apply SoD in a particular situation. I am repeating his question here, so we can address it in the more appropriate Tech Talk arena:&lt;/P&gt;&lt;P&gt;=-=-=-=&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;Lets take the scenario where customer agents in an organization who provide white glove services&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;i mean org provide some services/ tools to support premium customers to help them in removing their PII data from hundreds of Broker sites with the customers consent. The customer registers to the White Glove service and then the agent will get access to their PII data and other details like Driving Licence, SSN etc. in order to search in the broker sites and remove them from these web sites.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;Now my question is how does an Org make sure the agent will not misuse the data they are accessing&amp;nbsp;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;Can you help me to understand how can we apply SoD in this case? here the data masking can not be used&amp;nbsp; since the agent should copy and past it in their searching tool from one browser tab to other.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;i'm curious how do control this kind of PII data exposure to the internal agents without hampering the process?&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;any thought?&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;Thanks&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;Mouli&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="UserSignature lia-message-signature"&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;Mouli, CISSP&lt;/EM&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV class="UserSignature lia-message-signature"&gt;=-=--=&lt;/DIV&gt;&lt;DIV class="UserSignature lia-message-signature"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
    <pubDate>Sat, 26 Oct 2019 13:55:33 GMT</pubDate>
    <dc:creator>CraginS</dc:creator>
    <dc:date>2019-10-26T13:55:33Z</dc:date>
    <item>
      <title>Implementing Separation/Segregation of Duties</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Implementing-Separation-Segregation-of-Duties/m-p/29303#M1893</link>
      <description>&lt;P&gt;Over in the &lt;A href="https://community.isc2.org/t5/Career/bd-p/Career" target="_blank" rel="noopener"&gt;Careers area&lt;/A&gt; we had a thread kicked off by &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/329543157"&gt;@Lamont29&lt;/a&gt;&amp;nbsp;on the issues of differences in &lt;A href="https://community.isc2.org/t5/Career/Separations-of-Duties/td-p/12004" target="_blank" rel="noopener"&gt;career tracks in information technologies and information security&lt;/A&gt;, which spawned a second discussion on the &lt;A href="https://community.isc2.org/t5/Career/Insider-Threat-Protection-with-Separation-of-Duties/td-p/13183" target="_blank" rel="noopener"&gt;principle &amp;nbsp;of separation or segregation (SoD) of duties&lt;/A&gt;. Mouli&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/637665353"&gt;@iluom&lt;/a&gt;&amp;nbsp;asked me a good question there on how to apply SoD in a particular situation. I am repeating his question here, so we can address it in the more appropriate Tech Talk arena:&lt;/P&gt;&lt;P&gt;=-=-=-=&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;Lets take the scenario where customer agents in an organization who provide white glove services&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;i mean org provide some services/ tools to support premium customers to help them in removing their PII data from hundreds of Broker sites with the customers consent. The customer registers to the White Glove service and then the agent will get access to their PII data and other details like Driving Licence, SSN etc. in order to search in the broker sites and remove them from these web sites.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;Now my question is how does an Org make sure the agent will not misuse the data they are accessing&amp;nbsp;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;Can you help me to understand how can we apply SoD in this case? here the data masking can not be used&amp;nbsp; since the agent should copy and past it in their searching tool from one browser tab to other.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;i'm curious how do control this kind of PII data exposure to the internal agents without hampering the process?&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;any thought?&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;Thanks&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;Mouli&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="UserSignature lia-message-signature"&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;Mouli, CISSP&lt;/EM&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV class="UserSignature lia-message-signature"&gt;=-=--=&lt;/DIV&gt;&lt;DIV class="UserSignature lia-message-signature"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Sat, 26 Oct 2019 13:55:33 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Implementing-Separation-Segregation-of-Duties/m-p/29303#M1893</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2019-10-26T13:55:33Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing Separation/Segregation of Duties</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Implementing-Separation-Segregation-of-Duties/m-p/29304#M1894</link>
      <description>The short answer would be to build DLP solutions into your Security&lt;BR /&gt;Architecture. You can independently research these solutions as they are&lt;BR /&gt;offered by many vendors and I make it my practice not to recommend any&lt;BR /&gt;particular vendor's solution.&lt;BR /&gt;&lt;BR /&gt;Lamont</description>
      <pubDate>Sat, 26 Oct 2019 14:33:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Implementing-Separation-Segregation-of-Duties/m-p/29304#M1894</guid>
      <dc:creator>Lamont29</dc:creator>
      <dc:date>2019-10-26T14:33:39Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing Separation/Segregation of Duties</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Implementing-Separation-Segregation-of-Duties/m-p/29305#M1895</link>
      <description>&lt;P&gt;Mouli&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/637665353"&gt;@iluom&lt;/a&gt;, thank you for a great setup for discussion.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First, let's be sure we have grip on what SoD is about:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Critical actions&lt;/STRONG&gt; should not be allowed such that the same entity can approve the action, take it, and check on it. Those three authorities (approve, act, check) should be held by separate, independent entities.&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the earlier thread, Grandpa Rob&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;, referring to the Clark-Wilson model in computer programming, stated,&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;FONT face="courier new,courier"&gt;Separation of duties is an important security principle, first established by the Clark-Wilson model, and initially applied to programs, mandating that the agent responsible for doing the task, is not the agent responsible for checking the task.&lt;/FONT&gt;&lt;SPAN&gt;”&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Note that I added a third action, &lt;EM&gt;approval&lt;/EM&gt;, based on the pre-computer history of SoD in the world of financial management and accounting. Think of &lt;EM&gt;approve&lt;/EM&gt; as&amp;nbsp;meaning &lt;EM&gt;authorize&lt;/EM&gt;, and &lt;EM&gt;check&lt;/EM&gt; as&amp;nbsp;the same as &lt;EM&gt;audit&lt;/EM&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For Mouli's example, he is concerned about misuse of PII data mined by an agent responsible for cleaning broker sites. The &lt;EM&gt;authorize&lt;/EM&gt; step was made by the hiring organization, who contracted for the agent to perform the PII mining action.&amp;nbsp;The hired agent is, of course, responsible for the &lt;EM&gt;action&lt;/EM&gt; step. You question&amp;nbsp;asked how do you make sure the &lt;EM&gt;action agent&lt;/EM&gt; does not&amp;nbsp;misuse the data.&amp;nbsp;The first part is to&amp;nbsp;explicitly cover how to handle the data, and what&amp;nbsp;constitutes&amp;nbsp;misuse, in the contract&amp;nbsp;between the hiring organization and the action agent. We are now at the &lt;EM&gt;check&lt;/EM&gt; or &lt;EM&gt;audit&lt;/EM&gt; step. You will&amp;nbsp;need to determine what must be audited, based on our contractual definition of misuse in the contract with the action agent. With that determination, you can select an audit&amp;nbsp;capability either within your&amp;nbsp;&lt;/SPAN&gt;organization, or hire a third party to perform the audit. Either source for audit keeps it in SoD relationship with the action agent. Finally, if the auditor needs access to the action agent's systems, that access for purposes of audit must be spelled out in the original contract wit the agent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Messy? yes. Gotta have your contract lawyers in on the process? Yes, definitely.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good luck!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Oct 2019 15:32:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Implementing-Separation-Segregation-of-Duties/m-p/29305#M1895</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2019-10-26T15:32:56Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing Separation/Segregation of Duties</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Implementing-Separation-Segregation-of-Duties/m-p/29326#M1899</link>
      <description>&lt;P&gt;If you have the budget for it, you could implement two-person integrity (TPI). Two people do the work, with each one watching the other to ensure that neither does anything unauthorized. This assumes that only one of the two workers is potentially malicious.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2019 14:11:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Implementing-Separation-Segregation-of-Duties/m-p/29326#M1899</guid>
      <dc:creator>jmikesmith</dc:creator>
      <dc:date>2019-10-28T14:11:16Z</dc:date>
    </item>
  </channel>
</rss>

