CISM Certification Study Guide Part 1
CISM Certification Study Guide Part 1
STUDY GUIDE
Contents: Page #
1|Page
CHAPTER 1:
Information Security Governance
Objective
Ensure that the information security manager has the knowledge to establish and
maintain an information security governance framework and supporting processes to
ensure that the information security strategy is aligned with organizational goals and
objectives, information risk is managed appropriately and program resources are
managed responsibly
Information Security Governance Overview
2|Page
Information Security Governance
• Must be addressed at the highest organizational level
• Is part of enterprise governance
• Executive management & board of directors are accountable and must provide
the necessary:
o Leadership
o Organizational structures
o Processes
Management Tasks
3|Page
• Providing assurance that security incidents and breaches are not
catastrophic
• Establish:
o Basis for consistent/ repeatable behavior
o Eliminates the “moving target”
• Formal, documented evidence of stewardship
• Demonstrates due diligence to employee / business partners/customers/other
stakeholders
• Should serve as basis for audit criteria and employee evaluations
• Rules are required for all types of business processes and activities:
o Sales processes, hiring firing routines, payables accounting, workplace
etiquette, environmental/ disposal practices
• Information security is no different:
o Relatively complex rules need to be spelled out to all information system
stakeholders/users
4|Page
o Percentage of respondents saying their companies have a security
executive:
▪ In 2011, > 80%
▪ In 2006, 22%
o One-third of CISOs report to CIOs
o 35% of CISOs report to CEOs
o 28% of CISOs report to board of directors
• Strategic alignment:
o Aligned with business strategy to support objectives
• Risk management
o Mitigate risk and reduce impacts to acceptable levels
• Value delivery
o Optimizing security investments in support of objectives
• Resource optimization
o Security knowledge/ infrastructure used efficiently/ effectively
• Performance measurement
o Monitoring and reporting to ensure objectives achieved
• Integration
o Integrate relevant assurance factors to ensure that processes operate as
intended from end to end
5|Page
o Providing strategic direction
o Ensuring that objectives are achieved
o Ascertaining that risk is managed appropriately
o Verifying that the enterprise’s resources are used responsibly
• What is information security governance?
o Is a subset of corporate governance
o Provide strategic direction for security activities and ensures that objectives
are achieved
o Ensures that information security risk is appropriately managed
o Also helps ensure that information resources are used responsibly
• To achieve effective information security governance, management must establish
and maintain a framework
o Framework will guide the development and management of a
comprehensive information security program that supports business
objectives
• The governance framework generally consists of:
o A comprehensive security strategy linked with business objectives
o Security policies that address each aspect of strategy, controls and
regulation
o A complete set of standards for each policy
o An organizational structure void of conflicts of interest with sufficient
authority and resources
o Metrics and monitoring processes to ensure compliance and provide
feedback
6|Page
o Ensuring that all stakeholders impacted by security considerations are
involved
• Chief information security officer (CISO)
o Responsibilities currently range from the CISO who reports to the CEO to
system administrators who have part-time responsibility for security
management
7|Page
• Model originated at the Institute for Critical Information Infrastructure Protection
• A business-oriented approach to managing information security
• Best viewed as flexible, 3-D, pyramid-shaped structure made up of four elements
linked by six dynamic interactions
8|Page
• Outsourced operations
• Trading partners
• Merged or acquired organization
• It is important for the ISM to integrate assurance functions in order to: Increase
security effectiveness, reduce duplication efforts, and minimize gaps in protection
• KGIs to support assurance integration may include:
o No gaps in information asset protection
o Elimination of unnecessary security overlaps
o Seamless integration of assurance activities
o Well-defined roles and responsibilities
10 | P a g e
Information Security Strategy
11 | P a g e
• According to COBIT, the desired state is – ‘Protecting the interests of those relying
on information, and the processes, systems and communications that handle,
store and deliver the information, from harm resulting from failures of availability,
confidentiality and integrity
• The five key principles for governance and management of enterprise IT based on
COBIT 5:
o Meeting stakeholder needs
o Covering the enterprise end-to-end
o Applying a single, integrated framework
o Enabling a holistic approach
o Separating governance from management
• The desired state of security may also be defined as levels in the Capability
Maturity Model (CMM):
o 0. Nonexistent: no recognition of need
o 1. Ad hoc: Risks are considered on an ad hoc basis – no formal processes
o 2. Repeatable but intuitive: Emerging understanding of risk and need for
security
o 3. Defined process: Companywide risk management policy / security
awareness
o 4. Managed and measurable: Risk assessment standard procedure, roles
and responsibilities assigned, policies and standards in place
o 5. Optimized: Organization-wide processes implemented
• Determining the current state of security is also a critical activity where the same
methodology can be applied as to finding out the desired state.
• A security strategy needs to include:
o Resources needed
o Constraints
o A road map that includes people, processes, technologies, and other
resources and a security architecture defining the business drivers
• Achieving the desired state is a long-term goal of a series of projects
• Information security strategy resources include:
o Policies
o Standards
o Procedures
o Guidelines
o Architecture(s)
o Controls – physical, technical, procedural
o Countermeasures
o Layered defenses
o Technologies
o Personnel security
o Organizational structure
o Roles and responsibilities
o Skills
o Training
o Awareness education
12 | P a g e
• Information security strategy constraints include:
o Legal: laws and regulatory requirements
o Physical: Capacity, space, environmental constraints
o Ethics: Appropriate, reasonable and customary
o Culture: Both inside and outside the organization
o Costs: Time, money
o Personnel: resistance to change, resentment against new constraints
13 | P a g e
• Recurring security awareness program aimed at end users reinforces the
importance of information security
• Evidence indicated that the majority of end users are not aware of existing security
policies and standards
• Security awareness and training has often produced the most cost-effective
improvement in overall security
• Audits – both internal and external are one of the main processes used to
determine information security deficiencies
• Internal audits in most larger organizations are performed by an internal audit
department, generally reporting to either a chief risk officer (CRO) or to an audit
committee of the board of directors
• External audits are most often conducted by the finance department
• The ISM must develop procedures for handling compliance violations
• Threat assessment is a task within risk assessment, but has a strategic
component. It helps optimize risk response and facilitates policy development
• Vulnerability assessments should include assessing vulnerabilities in:
processes, technologies, facilities
• The most common types of insurance that can be considered: first party, third
party, fidelity bonds
• Business impact is the ‘bottom line’ of risk
• It is generally easier to reduce a potential impact than to mitigate a risk or reduce
a vulnerability
• Outsourcing is being used increasingly to cut costs but risks due to outsourcing
may be difficult to quantify and potentially difficult to mitigate
• Outsourced security services must not become a critical single point of failure
• Analysis of the gap between the current state and the desired state for each
defined metric identifies the requirements and priorities for the overall plan or road
map to achieve the objectives and close the gaps
• Policies must capture the intent, expectations and direction of management
• Security policies generally must be related to the security strategy
• Each security policy should state only one general security mandate
• Policies should rarely be more than few sentences long
• Standards are the ‘law’ developed from policy. It governs the creation of
procedures and guidelines
• Action plan metrics are methods to monitor and measure progress and the
achievement of milestones. Senior management is typically not interested in
detailed technical metrics
14 | P a g e
• Capability Maturity Models (CMM) are available for use on the implementation
of security governance
• Risk assessment is a standard procedure and exceptions to following the
procedure would be noticed by IT management
• Depending on the structure of the organization, each significant area needs to be
evaluated separately
• Policies need to be reviewed to determine whether they address each of the CMM
elements
• Objective is to achieve consistent maturity levels across specific security domains
• Intermediate goals are defined once the overall strategy has been completed
• Foundations of an information security program are: the security strategy and the
action plan
• The objective of the information security program is to protect the interests of those
relying in the information and the processes, systems, and communications that
handle, store and deliver the information from harm, resulting from failures of:
o Confidentiality
o Integrity
o Availability
• Information is available and usable when required, and the systems that provide
it can appropriately resist attacks
• Information is observed or disclosed to only those who have a right to know
• Information is protected against unauthorized modification
• Business transactions and information exchanges between enterprise locations or
with partners can be trusted
CHAPTER 2:
Information Risk Management and Compliance
15 | P a g e
Objective
16 | P a g e
• Incorporates all processes, activities, methodologies and policies of risk
management carried out in an organization.
17 | P a g e
o Controls
o Countermeasures
o Resource valuation
o Information asset classification
o Criticality
o Sensitivity
o Recovery Time Objectives (RTOs)
o Recovery Point Objectives (RPOs)
o Service Delivery Objectives (SDOs)
o Acceptable Interruption Window (AIW)
o Redundancy
• Risk management functions related to information security:
o Service Level Agreement (SLAs)
o System robustness and resilience
o Business continuity/disaster recovery
o Business process re-engineering
o Project management timelines and complexity
o Enterprise and security governance
o Systems life cycle management
o Policies -> standards -> procedures
• Information security manager (ISM) must have conceptual understanding of the
following technologies:
o Application security
o Physical security
o Environmental controls
o Logical access controls
o Network access controls
o Routers, firewalls, and other network components
o Intrusion detection/prevention
o Wireless security
o Platform security
o Encryption and PKI
o Anti-virus software and malware
o Spyware and adware
o Anti-spam
o Telecommunications and VoIP
18 | P a g e
o Risk assessment
o Risk treatment
o Acceptance of residual risk
o Risk communication and monitoring
• Risk acceptance can be optional and be covered by both risk treatment and risk
communication
• Determining the appropriate level of security depends on the potential risks that
an organization faces.
• Framework for risk management should have the following requirements:
o Policy
o Planning and resourcing
o Implementation program
o Management review
o Risk management process
o Risk management documentation
• An efficient framework corresponds to understanding the background of the
organization and its risk
• Risk management framework should also develop a structure and process for
the development of risk management initiatives and controls
• Framework approach is critical in developing a set of criteria against which the
risks will be measured
• Following key areas are essential in providing a comprehensive view of the
organization’s internal environment
o Key business drivers
o The organization’s strengths, weaknesses, opportunities, and threats
o Internal stakeholders
o Organization structure and culture
o Assets in terms of resources
o Goals and objectives, and the strategies already in place to achieve them
• Risk profile is essential for effective risk management and can be easily achieved
through a risk register
• Risk management context can be determined through defining the following:
o Organization range and the process or activities to be assessed
o Duration
o Full scope of the risk management activities
o Roles and responsibilities of various parts of the organization participating
in the risk management process
• Evaluation of risk must be decided upon three important criteria: Impact,
likelihood, and the rules that will determine whether the risk level is such that
further treatment activities are required
Risk Assessment
19 | P a g e
• Aggregate risk can exist when a particular threat affects a large number of minor
vulnerabilities that, in the aggregate, can have a significant impact.
• Cascading risks can also manifest unacceptable impacts as a result of one failure
leading to a chain reaction of failures.
• The first step in a risk management program should be generating a
comprehensive list of sources of threats, risks, and events that might impact
achieving each objective
• Risk can be characterized by the following:
o Origin
o A certain activity, event or incident
o Its consequences, results or impact
o Specific reason for its occurrence
o Protective mechanisms and controls
o Time and place of occurrence
• Risk identification methodology can be any one of the following:
o Team-based brainstorming: effective in building commitment and making
use of different experiences
o Structured techniques: flow charting, system design review, system
analysis, hazard and operability studies, and operational modeling
o What-if and scenario analysis: for less clearly defined scenarios such as
identification of strategic risks and processes with a more general structure
• Threat categories are as follows
o Natural: Flood, fire, cyclones, rain/hail, plagues, and earthquakes
o Unintentional: fire, water, building damage/ collapse, loss of utility services
and equipment failure
o Intentional physical: Bombs, fire, water and theft
o Intentional nonphysical: fraud, espionage, hacking, identity theft,
malicious code, social engineering, phishing attacks and denial-of-service
attacks
• The ISM must understand the business risk profile of the organization
• Risk is an inherent part of the business
• Risk cannot entirely be eliminated; every organization has a level of risk it will
accept
• The ISM must determine the point where cost of losses intersects with cost of risk
mitigation
• Risk analysis: the level of risk and its nature are assessed and understood
o Involves thorough examination of the risk resources
o Analysis of both positive and negative consequences
o Assessment of existing controls that tend to minimize negative risks or
enhance positive outcomes
• Risk level can be analyzed using statistical analysis of impact and likelihood
• Data that can be used to estimate impact and likelihood comes from: past
experiences, international standards, market research, experiments, economic or
engineering models, and specialist or expert advise
20 | P a g e
• Quantitative risk analysis: numerical values are assigned to both impact and
likelihood; consequences may be expressed in monetary, technical, or operational
terms
• Semi-quantitative analysis involves detailed analysis of magnitude and
likelihood of potential consequences
• Risk evaluation involves the decision to which risk to treat and the treatment
priorities
• Risk treatment involves four strategic options: Terminate, Transfer, Mitigate,
Tolerate
• To terminate a risk is to stop the activity giving rise to that risk
• Transferring a risk involves tapping a third party to manage that specific risk
• Mitigation is to reduce the risk through appropriate control measures
• Tolerating a risk means it falls to a certain acceptable level
• The cost of mitigating risk must not exceed the value of the asset
• Accepted risks should be evaluated and reviewed regularly
• Residual risk is the amount of risk that remains after countermeasures have been
implemented
• Acceptance of residual risk depends on: regulatory compliance, organizational
policy, sensitivity and criticality of assets, acceptable levels of potential
impacts, uncertainty inherent in the risk assessment approach, cost and
effectiveness of implementation
• Impact is the bottom line for risk management
• All risk management activities are designed to reduce impacts to acceptable
levels
• Impact is a result of any vulnerability exploited by a threat that causes a loss
• Business Impact Assessment (BIA) helps prioritize risk management and
provides the levels and types of protection required
• Controls that address the same risk are excessive and wasteful
• Risk assessment is important to be conducted from the beginning of process
through to the end
• If the cost of specific controls or countermeasures exceed the benefits of mitigating
a given risk, the organization may choose to accept the risk rather than incur the
cost of mitigation
• Total Cost of Ownership (TCO) must be considered for the full life cycle of the
control or countermeasure
• Monitoring processes is essential to have warning for events that could impact
the security program
• Recovery Time Objectives (RTO) depend upon numerous factors such as:
cyclical need of the information and organization, interdependencies upon the
information, organizational requirements, senior management requirement, legal
or regulatory requirement, and customer service levels
• RTOs are needed to identify and develop contingency strategies
• Shorter RTOs require costlier contingency procedures
• There is a break-even point where the impact of the disruption will begin to be
greater than the cost of recovery
• Recovery Point Objective (RPO) is determined based on the acceptable data
loss in case of disruption of operations
• Service Delivery Objective (SDO) is the minimum level of service that must be
restored after an event to meet business requirements
• Third-party service providers are sometimes tapped for risk transfer.
• It is important for the ISM to assess the risk of any outsourcing process where
there should be appropriate information risk management clauses in the contract
• For outsourcing arrangements, the organization must have appropriate controls
in place to facilitate the activity
• Considerations for outsourcing include: criticality of the business function,
complexity of the process, separation setting control requirements, regulatory
requirements, changes in internal and external business environment
• Some key clauses that should be part of Service Level Agreements (SLA) are:
right to audit the vendor’s books of accounts, right to review their processes,
insistence on standard operating procedures (SOP), right to assess skill sets
of vendor resources and advance information if the resources are to be changed
22 | P a g e
• Change management is an effective method to maintain adequate security
protection
• Proactive approach enables the ISM to better plan and implement security
policies and procedures in alignment with business goals and objectives
• It is more cost effective to update risk regularly
• Life cycle approach is the best way to employ to identify, analyze, assess and
track risk
• Top-down systematic approach can benefit from supporting tools, training and
assistance
• Software tools are also available to track the risk management life cycle
• People are generally the greatest risk to an organization, appropriate training can
significantly mitigate risk
• End users should receive training on the importance of adhering to the security
policies and procedures of the enterprise, responding to emergency situations,
significance of logical access in an IT environment, privacy and confidentiality
requirements
Documentation
23 | P a g e
o Links between the risk management policy and the organization’s strategic
and corporate business plans
o Extent and range of issues to which the policy applies
o Guidance on what is considered acceptable risk
o Risk management responsibilities
o Support expertise available to assist those responsible for managing risks
o Level of documentation required for various related activities
o A plan for reviewing compliance
o Incident and event severity levels
o Risk reporting and escalation procedures, format, and frequency
• General risk management documentation should include:
o A risk register
o Consequences and likelihood of compromise
o Initial risk rating
o Vulnerability to external/internal factors
o An inventory of information assets
o A risk mitigation action plan
24 | P a g e