The 10 Deadly Sins of Information Security Management
The 10 Deadly Sins of Information Security Management
The 10 Deadly Sins of Information Security Management
Abstract
This paper identifies 10 essential aspects, which, if not taken into account in an
Information Security Governance Plan, will surely cause the Plan to fail, or at
least, cause serious flaws in the Plan. These 10 aspects can be used as a
checklist by management to ensure that a comprehensive Plan has been defined
and introduced.
1. Introduction
All 10 these aspects are essential to take into account when implementing such
an Information Security Plan in a company, or to be evaluated when an existing
Information Security Plan seems to be having problems in being really effective.
From experience, if even one of these aspects is ignored, or not properly taken
into account, serious problems in introducing and maintaining a proper
Information Security Plan in a company will surely arise.
The paper will briefly discuss each of these aspects or sins, providing some
motivation why their absence from any plan will cause information security
related problems.
The paper ends with a tick list which Information Security Managers can use to
evaluate the presence/absence of these aspects from their Information Security
Plan.
These sins are introduced below, and discussed individually in the subsequent
paragraphs.
Sin Number:
These documents have been supported by a growing set of laws and legal
requirements which have appeared internationally, specifically related to the
privacy of customer, client and patient data. Some examples of such laws and
legal requirements are the ECT Act in SA [ECT] and the HIPAA Act [HIPAA] in the
USA.
The implication of these developments are that the Board of Directors as well as
top management, have a direct corporate governance responsibility towards
ensuring that all the information assets of the company are secure, and that due
care and due diligence has been taken to maintain such security. Compromised
company information assets can have serious financial and legal implications for
a company, and Executive Management can be held personally liable in some
cases.
Executive Management are not performing and exercising the due care and due
diligence expected by them, and may open themselves up to serious personal
and corporate liabilities.
Not realizing that the protection of Information is a business issue and not
a technical issue
This sin is closely related to the one discussed above, but is highlighted on its
own, because it does provide another dimension to the problem. Information
Security related problems in a company cannot be solved by technical means
alone. The sooner the management of a company grasps this fact, the sooner
they will apply due care.
This sin is again closely related to the one discussed above, but again is
significant enough to be mentioned on its own.
Information Security is a multi-dimensional discipline, and all dimensions must be
taken into account to ensure a proper and secure environment for a companys
information assets.
From this list, it is clear that most of these dimensions are of a non-technical
nature, which links to the previous discussed sin.
All these dimensions must be taken into account in designing and creating a
comprehensive information security plan for a company, because no single
dimension, or product or tool on its own will provide a proper all inclusive
solution.
A lop sided information security solution will be implemented, which will results
in frustration as further dimensions will continuously need to be added to the
solution.
2.4 Sin Number 4
It is therefore essential that a company must base its Information Security Plan
on some type of Risk Analysis exercise. This can be a very formal, structured
and comprehensive exercise, or a more high-level oriented approach in
combination with international best practices. The authors, based on experience,
prefer the last approach.
The company may be spending money on risks which may not really be that
dangerous, and ignoring others which may be extremely serious.
The typical questions the Information Security Manager (ISM) needs and wants
answers to, include:
These questions are very important, and must have receive answers, otherwise
the company may waste money on unnecessary or inefficient countermeasures.
Information Security is not a new aspect of IT. Many people and many companies
have struggled with information security over many years. In this process, they
have found out what are the right things, and how to do them right.
They have therefore determined from experience what best practices are
required and how to implement them effectively.
They can be seen as the consensus of experts in the field of information security,
and generally provide an internationally accepted framework on which to base
Information Security Governance and Management.
Nobody needs to re-invent the information security wheel. This wheel has been
developed, it is documented and should be used as such.
This does not necessarily mean that if these best practices are followed strictly
that no security incidents will occur. That is of course not true, but at least an
Information Security Manager, and the top management of companies know that
they are proving their due care and due diligence by following the advice of
experts.
Unnecessary time and money is wasted to arrive at a solution which had, most
probably, already been documented.
All international best practices for information security management stress the
fact that a proper Corporate Information Security Policy is the heart and basis of
any successful Information Security Management Plan.
Such a Policy is the starting point and reference framework on which all other
information security sub-policies, procedures and standards must be based.
Such a Policy must be short (3 to 4 pages), and signed by the CEO, showing
Executive Managements commitment and buy-in towards all information security
aspects. This is the most visible way in which Executive Management shows
their commitment towards information security in the company.
All Information Security projects and efforts in the company will have no
anchoring point and proof of high level commitment, and will not be floundering
around without really making progress.
Such monitoring and measurement tools must also not be built and dependant
on annual or bi-annual internal audit reports nobody can anymore afford to find
out after 6 months that a fired employee still have access rights to the system.
Such tools must be real time and provide real time monitoring and reporting.
You can only manage that which you can measure is directly related to this sin.
A false sense of security may exist and be cultivated because we have all the
necessary policies in place, without realizing that these policies may not being
complied with.
Such a structure has to do with the way in which information security is organised
and structured in a company. The importance of such structures is stressed by
several Codes of Best Practice for Information Security Management, which all
states that the existence of a proper organisational structure, including some type
of Information Security Forum, is essential for successful information security
implementations. This dimension not only refers to the organisational structure
itself, but also to aspects like information security related job responsibilities,
communication between information security related roles and the involvement of
top management with information security. It also includes clarity on what
aspects of information security management are to be centralized, what aspects
are to be decentralized as well as where the compliance monitoring and
enforcement capability will reside (should never be part of the IT Department
itself).
Consequences of committing this sin:
If information owners are not clearly defined, and held responsible for the
security of the information under their control, severe risks do arise.
Accountability for information security must be shared by all employees, and not
only the Information Security Manager. This accountability must be spelled out
clearly, and cemented into proper organizational structures.
No proper awareness programs exist, and users are unaware of the risks of
using the companys IT infrastructure, and the potential damage they can cause.
Furthermore they are often not even aware of the Information Security Policies,
Procedures and Standards existing in the company.
Users cannot be held responsible for security problems if they are not told what
such security problems are what they should do to prevent them.
Many information security related intensions will fail to materialize if users are not
properly educated in this regard.
Information Security Managers realize soon that they cannot do their job
properly, and either move on, or move out of information security. This opens the
company up to severe risks because no continuity exists as well as the fact that
the security plan never gets fully implemented.
3. Conclusion
This paper attempted to put all these essential components into place.
The following Tick List can be used to evaluate your companys Information
Security Plan in terms of the 10 Deadly Sins discussed above.
Our companys Information Security Plan fully takes into account that:
[COBIT] : www.isaca.org
[ECT] : www.doc.gov.za
[HIPAA] : www.hhs.gov/ocr/hipaa
[ISO17799] : www.iso.ch
[ISF] : www.isfsecuritystandard.com
[King] : www.iodsa.co.za
[von Solms] : von Solms SH, Corporate Governance and Information Security,
Computers and Security, 20, 2001, pp215-218