Chapter 3 - Governance and Security Planning Flashcards
Mission: explicitly declares the business of the organisation. it is the Identity. how the organisation goes there.
Vision: where the organisation wants to go. visions are not meant to express the probable, only the possible.
Value Statement: formal set of principles and values for measuring behaviour
..
Planning Hierarchy
Corporate Strategy
_______________|_______________________
| | | |
Financial Str. IT Str. Operations Str. |
| | | |
|_______Infosec Strategy______ |_________ |
|
Infosec Tactical Planning
|
Infosec Operational Planning
Budgeting, resource allocation and personnel are critical components of tactical plan.
managers and employees are using operational plans, which are derived from tactical plans to organise the ongoing, day to day performance of tasks.
First priority of CISO should be structure of strategic plan.
Basic components of a typical organisation level strategic plan includes:
- executive summary
- mission, vision, and values statements
- organisational profile and history
- strategic issues and challenges
- organisational goals and objectives
- major business unit goals and objectives
- appendicies.
IDEAL
Initiating:
Diagnosing: determine where you are relative to where you want to be
Establishing: plan how you will reach there
Acting: do the work according to the plan
Learning: learn from experience and improve
.
Information Security Governance Responsibilities
CEO
See overall posture
brief board, customer, public
CISO CSO CRO, Department Head..
set security policy, program, training for company
respond to security bridges
be responsible for annual independent audit
implement, audit, asses compliance
Mid Level Manager
implement/audit/asses compliance
communicate policies, program(training)
Employees
communicate policies, program(training)
implement policy, report security vulnerabilities and breaches
.
CERT GES Hierarchy
Risk Management Plans
Enterprise Security Strategy
Enterprise Security Plan
BU Plans, policies, procedures, architectures
.
ISO/IEC 27014:2013
Governance of Information Security
Evaluate, the current dtatus Direct, Monitor Communicate Assure
.
Security Convergence
merging of management accountability in the areas of physical secu, corporate risk management, computer security, network security, and InfoSec..,
.
Top Down approach for security implementation
must have a champion.
.
SDLC: system development life cycle
SecSDLC: security system development life cycle
after implementation, security program should be supported by continuous improvement(CIP).
IDEAL is one of the popular CIP model.
..
SDLC waterfall methodology(Implementation)
Investigation: begins with policy. manager and employees investigate problems, define scope, identify goals…
Analysis: Risk management starts here
Logical - Physical design:security policy, SETA, controls, Contingency Planning
Implementation:…
Maintenance and Change:
Implementation:
Champion: senior level sponsor
Team leader: understands project mgmt, personnel mgmt and technical requirements
Security policy developers; understand company culture, policies and requirements
Security professionals
System administrators
End users
Control Types:
Managerial Controls: security program management, address risk management and security controls.
Operational controls: addressing disaster recovery, personnel security, physical security
technical controls: logical access controls
infosec and staffing:
- where to position security
- Infosec community; plan for proper staffing
- IT community; understand how infosec affects IT and adjust job description and documented practices
- General community works with infosec to integrate infosec concepts into personnel management processes.
CISO: responsible for assessment management and implementation of security
Security Managers: day to day operations of infosec program, accomplishing objectives set by CISO, resolving issues identified by technicians
Security technicians: diagnosing and troubleshooting problems, configuring eg. firewalls, ensuring secure implementation
data owners: control and are therefore responsible for the information
data trustees: ultimately responsible C level executives
..