Information Security Harmonization
Information Security Harmonization
IT Governance Institute®
The IT Governance Institute (ITGI®) (www.itgi.org) was established in 1998 to advance
international thinking and standards in directing and controlling an enterprise’s information
technology. Effective IT governance helps ensure that IT supports business goals, optimises
business investment in IT, and appropriately manages IT-related risks and opportunities. The IT
Governance Institute offers symposia, original research and case studies to assist enterprise
leaders and boards of directors in their IT governance responsibilities.
Disclaimer
The Information Systems Audit and Control Association (the “Owner”) and the authors have
designed and created this publication, titled Information Security Harmonisation—
Classification of Global Guidance (the “Work”), primarily as an educational resource for
security professionals. The Owners make no claim that use of any of the Work will assure a
successful outcome. The Work should not be considered inclusive of any proper information,
procedures and tests or exclusive of other information, procedures and tests that are reasonably
directed to obtaining the same results. In determining the propriety of any specific information,
procedure or test, the security professional should apply his/her own professional judgement to
the specific circumstances presented by the particular systems or information technology
environment.
Disclosure
Copyright © 2005 by Information Systems Audit and Control Association. All rights reserved.
No part of this publication may be used, copied, reproduced, modified, distributed, displayed,
stored in a retrieval system, or transmitted in any form by any means (electronic, mechanical,
photocopying, recording or otherwise), without the prior written authorisation of ITGI.
ISBN 1-933284-05-6
Information Security Harmonisation—Classification of Global Guidance
Printed in the United States of America
ii
Acknowledgements
Acknowledgements
From the Publisher
Information Systems Audit and Control Association wishes to recognise:
The author
Leslie Ann Macartney, CISA, CISM, UK
iii
Information Security Harmonisation—Classification of Global Guidance
iv
Table of Contents
Table of Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Purpose for Classification of the Guidance. . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Security Guidance Included in This Research . . . . . . . . . . . . . . . . . . . . . . . . . 1
The Classification Framework. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Document Taxonomy Chart. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
The CISM Domain Chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
How to Use This Publication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
History and Role of ISACA and ITGI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Approach to the Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1. BS 7799 Part 2:2002 Information Security Management
Systems—Specification With Guidance for Use . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2. COBIT® . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3. SSE-CMM® Systems Security Engineering—Capability
Maturity Model 3.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4. GAISP Version 3.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
5. The Standard of Good Practice for Information Security . . . . . . . . . . . . . . . . . . 39
6. ISO/IEC 13335 Information Technology—Guidelines for
the Management of IT Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
7. ISO/TR 13569:1997 Banking and Related Financial
Services—Information Security Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
8. ISO/IEC 15408:1999 and Common Criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
9. ISO/IEC 17799:2000 Information Technology—
Code of Practice for Information Security Management . . . . . . . . . . . . . . . . . . . 73
10. Security Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
11. NIST 800-12 An Introduction to Computer Security—The
NIST Handbook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
12. NIST 800-14 Generally Accepted Principles and
Practices for Securing Information Technology Systems . . . . . . . . . . . . . . . . . . . 99
13. NIST 800-18 Guide for Developing Security Plans for Information
Technology Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
14. NIST 800-53 Recommended Security Controls for Federal
Information Systems, Second Public Draft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
15. OCTAVE® Criteria Version 2.0 Networked Systems
Survivability Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
v
Information Security Harmonisation—Classification of Global Guidance
vi
Introduction
Introduction
Purpose for Classification of the Guidance
The role of the information security manager has evolved over the past few years.
It has shifted from a position that focussed essentially on IT to one where business
acuity takes equal priority. At the same time, numerous security standards, codes of
practices, methodologies, etc., have been developed and published, all with the
purpose of providing some level of direction or support for security objectives. All
of them are focussed on one or more issues of importance. However, because there
are so many and a harmonisation framework did not exist, the perception has
existed that there is a standards quagmire. This is where this technical study from
ITGI intends to add some clarity to the picture.
This report will also be useful in presenting the concept of managing risk on an
enterprisewide basis, from the boardroom to the network. It helps link risk
management and the information presented to governance.
Despite the quantity and diversity of available security guidance worldwide, there
remain areas of information security management that do not appear to be
addressed to the level or detail required in today’s environments. ISACA/ITGI will
follow up this research with further work to define these gaps and produce
additional guidance as required. Additionally, this document will be updated
periodically to reflect additional guidance, changes to guidance and advice on how
the guidance can be used, based on best practice surveys.
1
Information Security Harmonisation—Classification of Global Guidance
2
Introduction
3
Information Security Harmonisation—Classification of Global Guidance
4
Introduction
Note that BS 7799 and ISO/IEC 17799 have different qualifications because one is
a specification (or method) for information security management whilst the other is
a set of guidelines and recommended information security practices.
The CISM domain chart in figure 3 provides a summary of how and to what level
of detail each of the 17 global guidance documents provides coverage of the task
and knowledge requirements within the five CISM domains. It suggests its likely
usefulness to the CISM who feels weak in the knowledge requirements of one or
more domains. Secondly, it provides to all security practitioners potentially new
approaches to common information security management activities.
This research has allocated each of the global guidance documents a ranking2 of 4,
3, 2, 1 or 0 for each of the five CISM domains. These rankings are not intended to
indicate the quality of the publication but are designed to indicate their
helpfulness to a CISM (or someone seeking to gain CISM certification) in
addressing the specific objectives of each CISM domain. The five levels are further
defined in figure 2.
2
The use of a ranking of 5 has been specifically excluded as none of the examined guidance documents
was found to provide full coverage of a CISM domain.
5
Information Security Harmonisation—Classification of Global Guidance
The overall score uses the same definitions, but in relation to all five CISM
domains. In this context, the overall score is not necessarily an average of the
individual scores.
6
Introduction
A full description of the CISM job domains and the associated task and knowledge
statements is provided in the appendix of this document.
Consider the guidance currently used by the enterprise and then review the
document taxonomy in figure 1. Determine whether the guidance currently used is
adequate for the anticipated needs of the enterprise in the future across the five
areas mapped:
• Information security management programme component
• Security principles
• High-level information security controls
• Detailed control practices
• Model or methodology
In the end, each enterprise must analyse its needs and evaluate its weaknesses and
strengths as they relate to information security.
7
Information Security Harmonisation—Classification of Global Guidance
ISACA reflected the growing awareness of the vital role of technology in helping
businesses achieve their corporate aims with the creation of the IT Governance
Institute in 1998. Effective IT governance helps ensure that IT supports business
goals, maximises business investment in IT, and appropriately manages IT-related
risks and opportunities.
CISM holders and other readers of this document are encouraged to provide ISACA
with feedback on their own specific experiences of using the referenced guidance
and to suggest others that should be included in this classification. The security
guidance included in this document undoubtedly will undergo change/modification
and, as mentioned previously, it is intended that this report will be updated regularly
to reflect changes and finalisation, in addition to new guidance that comes into
existence.
3
Five geographic locations were used: Asia, Central/South America, Europe/Africa, North America and
Oceania.
8
BS 7799 Part 2:2002 Information Security Management
Systems—Specification With Guidance for Use
Document Taxonomy
The original BS 7799 was issued as two parts:
• BS 7799-1: Information Technology—Code of Practice for Information Security
Management
• BS 7799-2: Information Security Management Systems—Specification with
Guidance for Use
Circulation
BS 7799-2 is a British Standard that is widely known and used internationally.
9
Information Security Harmonisation—Classification of Global Guidance
Target Audience
The guidance is prepared for business managers and their staff as a model for an
information security management system. It can also be used by certification
bodies.
Timeliness
BS 7799-2 was first developed and issued in 1998 as a specification to complement
BS 7799-1 (now ISO/IEC 17799). It was revised in 1999 to reflect changes in part
1 and again in 2002 to harmonise with other ISO management standards. British
Standards are normally revised every three to five years. The next version of
ISO/IEC 17799 is due for release in April 2005 and it is anticipated that BS 7799-
2, updated to reflect the ISO/IEC 17799:2005, may very well become an ISO
standard by the end of 2006.
Certification Opportunities
A certification scheme exists to certify organisations toward compliance. Although
this is a British Standard, more than 9004 organisations in more than 40 countries
have been evaluated and certified to BS 7799-2.
Completeness
BS 7799-2 is a model that includes every activity required to “establish, implement,
operate, monitor, review, maintain and improve a documented information security
management system”. It is designed to be used by organisations of any size or type,
and is not geographically specific.
4
Figures obtained from the International Information Security Management System User Group web site
at www.xisec.com.
10
BS 7799 Part 2:2002 Information Security Management
Systems—Specification With Guidance for Use
Availability
The guidance is available for purchase from www.bsi-global.com (GB sterling
£28.00 for British Standard Institute members and £56.00 for nonmembers).
Recognition/Reputation
Based on the global survey of CISMs (described in this document’s Introduction),
BS 7799-2 is globally recognised and considered to be a widely accepted standard
by a large majority (74 percent) of the respondents.
Usage
BS 7799-2 is comprehensive and is being actively used (i.e., implemented, used as
best practice or used for assessment) by the majority (57 percent) of surveyed
CISMs in Europe/Africa, Central/South America and Oceania. Asia figures are
slightly below this (48 percent) and in North America the figure falls to 39 percent.
These are significant figures for an individual standard.
11
Information Security Harmonisation—Classification of Global Guidance
Risk Management, 1
BS 7799-2 contains references to and definitions of risk management activities but
it provides no guidance on development and application of risk management
methods.
Response Management, 1
The guidance contains only brief references to response management, and as a
whole is limited in this area and provides no direction.
Overall, 2
This is a useful model for those wishing to establish a framework for the
management of an information security management system and a must for those
seeking BS 7799 certification. It needs to be used by an experienced information
security manager and must be supplemented with other information security
standards and guidance.
12
BS 7799 Part 2:2002 Information Security Management
Systems—Specification With Guidance for Use
Since the PDCA is an approach used in several globally respected standards, the
following is a brief description of the approach that would be used to manage a
comprehensive information security management system.
Check activities are concerned with monitoring and reviewing the information
security management system and include:
• Execution of monitoring and other control procedures
• Reviews of information security management system effectiveness
• Reviews of residual risks and acceptable risks
Act activities are concerned with maintaining and improving the information
security management system and include:
• Implementing improvements (including taking corrective and preventive actions
to eliminate the cause of nonconformities and guard against future
nonconformities)
• Learning from experiences (one’s own and those of other organisations)
• Ensuring that improvements meet the objectives
The standard describes the types of documentation needed to establish and manage
the information security management system as well as those needed to satisfy the
British Standard (and are therefore necessary for certification to the standard). It also
describes the procedures that need to be in place to control documents and records.
13
Information Security Harmonisation—Classification of Global Guidance
Annex A of the standard is a list of control objectives and controls that are directly
derived from those listed in ISO/IEC 17799:2000 and must be used as part of the
controls selection process identified in the plan stage.
Annex B provides guidance on the use of the standard, including details on what
should be documented in scope statements, risk assessments and risk treatment
plans. There is also guidance on what type of checking and self-policing procedures
may be applied, how to approach information security management system audits
and dealing with nonconformities. A table within annex B maps seven of the nine
OECD security principles against the PDCA model of BS 7799-2.
Reference
www.bsi-global.com
14
COBIT
2. COBIT
Issuer
The IT Governance Institute is the copyright holder and issuer of the COBIT
guidance. COBIT is a worldwide de facto standard.
Document Taxonomy
COBIT represents a collection of documents and a framework that are classified as
generally accepted best practices for IT governance, control and assurance. Its use
reaches IT management, security, control and user management. The framework,
along with the Committee of Sponsoring Organisations of the Treadway
Commission (COSO), is considered to be critical to compliance with the US
Sarbanes-Oxley Act.
Circulation
COBIT is accepted worldwide. In addition to the English version, it has been
translated into several languages, including Dutch, French, German and Spanish.
15
Information Security Harmonisation—Classification of Global Guidance
Target Audience
Within organisations, three levels are addressed: management, IT users, and control
and security professionals. Many types of organisations, public and private
companies and external assurance professionals form the relevant target group.
Timeliness
The first edition of COBIT was issued in 1996. In 1998 the second edition was
published with additional control objectives as well as the Implementation Tool Set.
The third edition was issued in 2000 and included the Management Guidelines as
well as an overall update. Management Guidelines includes a maturity model for IT
governance and each of the objectives, as well as key goal indicators, critical
success factors and key performance indicators. It is still relevant and up to date.
The latest enhancements to COBIT at the time of this publication in 2005 include:
• COBIT® Quickstart™
• COBIT Online®
• IT Governance Implementation Guide
• Control Practices
• COBIT® Security Baseline™
Certification Opportunities
COBIT’s audit guidelines contain information for auditing and self-assessment
against the control objectives, but there is no certification programme available for
any part of COBIT. The COBIT framework is used frequently by Certified Public
Accountants (CPAs) and Chartered Accountants (CAs), for instance, when
performing an SAS 70 review, and has rapidly become the IT control framework of
choice for organisations addressing international regulatory issues, such as the US
Sarbanes-Oxley Act of 2002.
16
COBIT
Completeness
COBIT addresses a broad spectrum of duties in IT management and can be of
significant interest and use to the security manager, particularly if the organisation
decides to build an IT governance framework using COBIT as its model. It does not
contain the full depth of security management activities contained in
ISO/IEC 17799.
Availability
COBIT is available in a variety of ways. First, the most dynamic and useful manner
is through COBIT Online. It can be purchased by going to
www.isaca.org/cobitonline. The approach allows users to customise a version of
COBIT to suit their own enterprise, then store and manipulate that version as desired.
It also offers full online access to all of COBIT, an editable Access database
download feature, real-time surveys, an active community forum and a robust
benchmarking feature.
Also, most parts of COBIT are readily accessible for complimentary electronic
download from the ISACA or ITGI web sites, www.isaca.org or www.itgi.org. The
audit guidelines are posted for complimentary download for ISACA members only.
Alternatively, a printed set and fully searchable CD-ROM can be purchased from
the ISACA Bookstore, [email protected].
Recognition/Reputation
Based on the global survey of CISMs (described in this document’s Introduction),
recognition of COBIT is extremely high, at over 98 percent. Of equal or more interest
is that a majority (58 percent) of surveyed CISMs (security professionals) felt that
COBIT is a well-accepted global standard.
Usage
COBIT is considered to be comprehensive and effective and is being actively used
(i.e., implemented, used as best practice or used for assessment) by more than 40
percent of surveyed information security managers globally (rising to in excess of
60 percent in Central/South America). These are significant figures for an
individual standard and are exceeded only by ISO/IEC 17799 and BS 7799.
Although this high level of use may be explained by the CISM population’s
relationship to ISACA, it should also be noted that security managers do not, in
general, make use of standards they hold in low esteem.
17
Information Security Harmonisation—Classification of Global Guidance
Risk Management, 1
Risk management is referenced specifically in the PO9 process of COBIT. The
remaining areas address it, but not to any great detail.
Response Management, 1
Response management is referenced, but not to any detail.
Overall, 2
This guidance, although comprehensive, would be useful to an information security
manager if his/her organisation is planning to implement COBIT and/or enhance the
broader IT governance concepts, including how security management fits into the
overall equation. Since much of the security material is aimed at educating IT
management in security matters rather than as guidance to security managers, its
use beyond overall governance is somewhat limited.
18
COBIT
This theme can be taken further by considering information security governance. It,
too, has a highly interdependent relationship with enterprise governance and IT
governance. Whilst COBIT has not been developed specifically with the information
security manager as a primary target, a large amount of the material is relevant to
the information security programme. There are several publications that make up
COBIT. Of key interest to the information security manager are addressed in the
following subsections.
COBIT Framework
The COBIT Framework (65 pages) has been designed as a method of creating an IT
governance framework that bridges the “business control model” with a “focussed
IT control model”. In designing the framework, work performed by many
organisations was referenced, including ISO/IEC 17799 Code of Practice for
Information Security Management and several of the NIST publications. Also
considered were business control models by COSO in Internal Control—Integrated
Framework of 1992, Cadbury in the UK, CoCo in Canada and King in South Africa.
The framework identifies the need to satisfy the quality, fiduciary and security
requirements for information. These broad requirements are then broken into seven
distinct, but overlapping, categories:
• Quality:
1. Effectiveness—Information must be relevant and pertinent to the business
process as well as be delivered in a timely, correct, consistent and useable
manner.
2. Efficiency—This calls for provisioning information through the most optimal
(productive and economical) use of resources.
• Security:
3. Confidentiality—Sensitive information must be protected from unauthorised
disclosure.
4. Integrity—Information must be complete and accurate and in line with
business values and expectations.
5. Availability—Information, and associated resources and capabilities, must be
available when needed now and in the future.
• Fiduciary:
6. Compliance—This deals with laws, regulation and contractual arrangements to
which the business is subject.
7. Reliability of information—This category relates to provision of the
information needed by management to operate the entity and to exercise
financial and compliance reporting responsibilities.
19
Information Security Harmonisation—Classification of Global Guidance
The framework then provides 34 control objectives that are described within four
domains. The domains are designed to fit in with the same PDCA models used by
OECD security guidance, ISO/IEC 9000, 14000, 15000 and BS 7799-2:2002. The
four domains (see figure 4) are:
• Plan and Organise—11 objectives, numbered P01 to P11
• Acquire and Implement—6 objectives, numbered AI1 to AI6
• Deliver and Support—13 objectives, numbered DS1 to DS13
• Monitor and Evaluate—4 objectives, numbered M1 to M4
BUSINESS OBJECTIVES
IT GOVERNANCE
Effectiveness
Efficiency
Confidentiality
Integrity
Availability
Compliance
Reliability
MONITOR PLAN AND
AND EVALUATE ORGANISE
IT RESOURCES
People
Application systems
Technology
Facilities
Data
DELIVER AND
SUPPORT ACQUIRE AND
IMPLEMENT
DS1 define and manage service levels
DS2 manage third-party services
DS3 manage performance and capacity
DS4 ensure continuous service
DS5 ensure systems security
DS6 identify and allocate costs
DS7 educate and train users
DS8 assist and advise customers AI1 identify automated solutions
DS9 manage the configuration AI2 acquire and maintain application software
DS10 manage problems and incidents AI3 acquire and maintain technology infrastructure
DS11 manage data AI4 develop and maintain procedures
DS12 manage facilities AI5 install and accredit systems
DS13 manage operations AI6 manage changes
20
COBIT
21
Information Security Harmonisation—Classification of Global Guidance
Step 18
Record and authorise all changes, including patches (emergency changes
possibly after the fact).
COBIT Security Baseline also provides six survival kits, each aimed at a different
audience, consisting of a checklist of actions that need to be addressed to ensure
baseline security.
Is the enterprise clear on its position relative to IT and security risks? Does it
tend toward risk avoidance or risk taking?
How much is being spent on information security? On what? How were the
expenditures justified? What projects were undertaken to improve security last
year? Have sufficient resources been allocated?
22
COBIT
How many staff had security training last year? How many of the management
team (members) received security training?
Control Practices
Control Practices (226 pages) expands the capabilities of COBIT by providing the
practitioner with an additional level of detail. Whilst the COBIT IT processes,
business requirements and detailed control objectives define what needs to be done
to implement an effective control structure, Control Practices provides the more
detailed how and why. Each of the 318 control objectives is listed here along with
a brief rationale for why, and control practices for how.
Control Practices
1. Management defines parameters, characteristics and procedures that
identify and declare emergencies.
2. All emergency changes are documented, if not before, then after
implementation.
3. All emergency changes are tested, if not before, then after implementation.
4. All emergency changes are formally authorised by system owners and
management before implementation.
5. Before and after images, as well as an intervention log, are retained for
subsequent review.
COBIT Quickstart
This special version (46 pages) is a baseline for many small to medium enterprises
(SMEs) and other entities where IT is not mission-critical or essential for survival.
It can also serve as a starting point for other enterprises in their move toward an
appropriate level of control and governance of IT.
23
Information Security Harmonisation—Classification of Global Guidance
COBIT Online
This online version of COBIT allows users to customise a version of COBIT for their
own enterprise, then store and manipulate that version as desired. It offers online,
real-time surveys and benchmarking, as well as a discussion facility for sharing
experiences and questions.
References
www.isaca.org/cobit
www.itgi.org
24
SSE-CMM Systems Security Engineering—Capability Maturity Model 3.0
Document Taxonomy
SSE-CMM Model Description Document 3.0 (SSE-CMM 3.0) is a guide to the
concepts and application of a model to improve and assess security engineering
capability. Version 2 was made ISO/IEC 21827 in 2002.
Circulation
The guidance is widely known and used internationally by organisations involved
in security engineering.
25
Information Security Harmonisation—Classification of Global Guidance
Target Audience
The guidance is primarily aimed at organisations that practice security engineering
in the development of operating systems software, security managing and enforcing
functions, software and middleware of applications programmes. Specific users are
likely to be product developers, service providers, system integrators, system
administrators and security specialists. The guide will also be of use to evaluation
organisations or acquiring organisations (e.g., in Requests for Proposal).
Timeliness
Development of SSE-CMM began in 1995, with the first version published in 1996.
Version 2 followed and was made ISO/IEC 21827 in 2002. Version 3 was released
in 2003 and the ISSEA remains dedicated to improving the model.
Certification Opportunities
There is a documented SSE-CMM Appraisal Method that includes support
materials for an appraisal. It was designed primarily for internal process
improvement. An Appraiser Certification Programme is being developed.
Completeness
The document is an excellent capability maturity model for evaluating and
improving the quality of security engineering. However, it provides only limited
information on the full role and responsibilities of an information security manager
who is establishing, implementing and managing an enterprisewide information
security programme, so it should be supplemented with other security publications.
Availability
SSE-CMM 3.0 is available by free download from the SSE-CMM web site at
www.sse-cmm.org. Version 2, now published as ISO/IEC 21827, can be purchased
from www.iso.org for Swiss CHF 208.00.
26
SSE-CMM Systems Security Engineering—Capability Maturity Model 3.0
Recognition/Reputation
Based on the global survey of CISMs in 2004 (described in this document’s
Introduction), SSE-CMM is well recognised (60 to 70 percent) in Asia, North
America and Central/South America, but much less so in Oceania and
Europe/Africa (more than 40 percent had no experience with the guidance). The
majority of CISMs (52 percent) in all regions felt it has only limited acceptance
amongst security professionals.
Usage
Active usage (i.e., implemented, used as best practice or used for assessment) of
SSE-CMM is disappointing at only 20 percent, although this rises to one-third in
Central/South America. The majority (69 percent) of all CISMs familiar with it
found it to be effective, but views on its level of comprehensiveness varied, with
Oceania in particular having reservations.
Risk Management, 2
Following the SSE-CMM would improve performance in this domain, but it is best
used by an experienced information security manager who already has the domain
activities established.
27
Information Security Harmonisation—Classification of Global Guidance
Response Management, 2
Following the SSE-CMM would improve performance in this domain, but it is best
used by an experienced information security manager who already has the domain
activities established.
Overall, 2
This is an excellent model for improving capabilities but it does not in itself provide
guidance to an information security manager on how to define and establish an
enterprisewide information security management programme. It would be most
effective in the hands of an experienced information security manager.
The guide describes security engineering in terms of the following goals (describes
rather than defines as the role is evolving and, it claims, there is no consensus in the
security community):
• Gain understanding of the security risks associated with an enterprise.
• Establish a balanced set of security needs in accordance with identified risks.
• Transform security needs into security guidance to be integrated into the activities
of other disciplines employed on a project and into descriptions of a system
configuration or operation.
• Establish confidence or assurance in the correctness and effectiveness of security
mechanisms.
• Determine that operational impacts due to residual security vulnerabilities in a
system or its operation are tolerable (acceptable risks).
• Integrate the efforts of all engineering disciplines and specialties into a combined
understanding of the trustworthiness of a system.
SSE-CMM was designed to fill a perceived gap between the existence of security
engineering principles and evaluation of practices by providing a framework within
which an evaluation can be carried out.
The guide introduces the concept of maturity models to security. Explanations are
given to the importance of statistical control processes and how they can predict
defects and help identify where improvements in a process can be made. It also
addresses the concept of process maturity describing it as “the extent to which a
specific process is explicitly defined, managed, measured, controlled, and
effective”. Applied to security engineering this means that a capability maturity
28
SSE-CMM Systems Security Engineering—Capability Maturity Model 3.0
model can help an organisation evolve from an “ad hoc, less organised, less
effective state to a highly structured and highly effective state”.
The guide describes expected results from using SSE-CMM as most likely to be:
• Improvements in predictability—Organisations are better at knowing whether
they will meet their targets and, if not, by how much they will miss.
• Improvements in control—Targets are revised more accurately and corrective
actions are evaluated to select the best application of control measures.
• Improvements in process effectiveness—Targeted results improve as the costs
decrease, and productivity and quality increase.
A number of practices are used in each of these areas. Practices are split into base
practices and generic practices. The generic practices are those that indicate process
management, whilst base practices are those that collectively define security
engineering. One performs generic practices as a part of performing a base practice.
This is most easily explained using the example provided by the guide.
Putting the base practice and generic practice together provides a way to check
an organisation’s capability to perform a particular activity. Here an interested
party might ask, “does your organization allocate resources for identifying
system security vulnerabilities?” If the answer is “yes,” the interviewer learns
a little about the organization’s capability, additional information is gained
from the supporting documentation or artefacts.
The SSE-CMM has 61 base practices within 11 process areas that cover security
engineering. As security engineering must integrate with so many other areas, the
guide also includes for context 68 base practices and 11 process areas that address
project and organisation (drawn from both the Systems Engineering CMM and the
Software CMM).
29
Information Security Harmonisation—Classification of Global Guidance
The 11 security processes are numbered for reference and are purposely referred to
in alphabetical order to discourage thoughts that the process areas are ordered by
life cycle. The 11 security process areas are:
• PA01 Administer Security Controls—The intended security for the system is
achieved in its operational state.
• PA02 Assess Impact—Identify impacts (tangible and intangible) and the
likelihood of the impacts occurring.
• PA03 Assess Security Risk—Identify and assess the likelihood of exposures.
• PA04 Assess Threat—Identify and characterise security threats.
• PA05 Assess Vulnerability—Identify and characterise security vulnerabilities.
• PA06 Build Assurance Argument—Clearly convey that security requirements are
met (evidential activities).
• PA07 Co-ordinate Security—Ensure open communications between security
engineering and all other involved parties (e.g., project personnel).
• PA08 Monitor Security Posture—Identify and report all breaches or attempted
breaches of security as well as mistakes that could lead to breaches.
• PA09 Provide Security Input—Provide security information needed by interested
parties (e.g., system architects, designers).
• PA10 Specify Security Needs—Explicitly identify security needs for the system.
• PA11 Verify and Validate Security—Verify and validate throughout design and
development and against the customer’s operational security needs.
Description
A number of metrics can be used to measure the impact of an event. It is
advantageous to predetermine which metrics will be used for the particular
system under consideration, i.e., example work products, selected impact
metrics.
Notes
A limited set of consistent metrics minimizes the difficulty in dealing with
divergent metrics. Quantitative and qualitative measurements of impact can be
achieved in a number of ways, such as:
• Establishing the financial cost
• Assigning an empirical scale of severity, e.g., 1 through 10
• The use of adjectives selected from a predefined list, e.g., low, medium, high
30
SSE-CMM Systems Security Engineering—Capability Maturity Model 3.0
Generic practices are grouped into five capability levels and reflect the maturity of
the capability. Each has common features that describe an organisation’s
characteristic manner of performing a work process, as follows:
• Level 1 Performed Informally—Base practices. “You have to do it before you can
manage it” is how SSE-CMM characterises this level.
• Level 2 Planned and Tracked—Project-level definition, planning and
performance, characterised by SSE-CMM as understanding what is happening on
the project before defining organisationwide processes.
• Level 3 Well Defined—Disciplined tailoring, characterised as “using the best of
what is learned from projects to create organisationwide processes”.
• Level 4 Quantitatively Controlled—Measurements tied to organisational business
goals, characterised by “you cannot measure it until you know what ‘it’ is” and
“managing with measurement is only meaningful when you’re measuring the right
things”.
• Level 5 Continuously Improving—Sustaining gains and improvements,
characterised by “a culture of continuous improvement (that) requires a
foundation of sound management practice, defined processes, and measurable
goals”.
Notes
Training, and how it is delivered, will change with process capability due to
changes in how the process(es) is performed and managed.
Relationships
Training and training management is described in PA21 Provide Ongoing
Skills and Knowledge.
The guide also contains advice on how to use the SSE-CMM separately addressing
process improvement, capability evaluation and gaining assurance.
31
Information Security Harmonisation—Classification of Global Guidance
References
www.issea.org
www.sse-cmm.org
www.iso.org
32
GAISP Version 3.0
The current draft version of GAISP appeared as of August 2003 as a merged effort
between Generally Accepted System Security Principles (GASSP), produced by
International Information Security Foundation (IISF) in the early 1990s, and
Commonly Accepted Security Practices and Recommendations (CASPR), produced
by the CASPR Working Group.
Document Taxonomy
GAISP is a collection of security principles that is being defined and produced as
a collective effort by members of the organisations involved.
Circulation
GAISP is known to the wider information security community, but particularly so
by members of ISSA and within North America.
33
Information Security Harmonisation—Classification of Global Guidance
Target Audience
This is not stated explicitly in GAISP, but it would appear to be most suited to the
information security practitioner and is flexible enough to serve most types and
sizes of organisation.
Timeliness
Version 3 of GAISP is described on the Internet as a draft document. It is undated
but has obviously been altered as recently as August 2003. However, many of the
references provided are well out of date and it is likely that much of the document
in its current form was written in the early to mid 1990s. As of the date of this
publication, it has not yet been updated or finalised.
Certification Opportunities
There is no certification process for adhering to GAISP principles.
Completeness
GAISP provides a good set of general principles that addresses the necessary areas
of information security management and should be relevant for an organisation of
any type, size or geographic location.
It does not contain any level of detail below information security principles.
Availability
GAISP is currently in draft mode and can be downloaded without cost from
www.gaisp.org.
34
GAISP Version 3.0
Recognition/Reputation
Based on data gathered from the global CISM survey (described in this document’s
Introduction), GAISP is generally well known in North America (67 percent) but is
less known elsewhere, particularly in Europe/Africa (40 percent). Acceptance of
GAISP as a standard is rather limited (90 percent feel it has either limited or no
acceptance), a view expressed in all geographic regions.
Usage
Usage of GAISP is very low (less than 18 percent), even in North America where
it is well known. However, it is thought to be reasonably comprehensive and
effective in what it addresses by all regions except Europe/Africa.
Risk Management, 1
GAISP addresses risk management as a principle, but not in great depth.
Response Management, 0
Response management is briefly addressed as a principle.
Overall, 2
GAISP contains a good set of principles upon which an information security
programme can be created, but it provides very little in the way of detailed
guidance. What it does provide, not found elsewhere, is examples to support each
of the principles.
35
Information Security Harmonisation—Classification of Global Guidance
There are nine pervasive principles and each is briefly described in GAISP along
with a rationale for the principle and an example of application. The nine principles
were founded on those contained within the Guidelines for Security of Information
Systems published by the OECD in 1992. The OECD reissued its guidelines in 2002
with a different set of principles. Although GAISP is in line with the original nine
that were issued in 1992, each is still valid in the way in which it is described.
GAISP’s nine pervasive principles are:
• Accountability principle—Ensuring that responsibilities and accountability are
clearly defined and accepted
• Awareness principle—Ensuring that everyone, regardless of organisational role,
has the required security knowledge
• Ethics principle—Ensuring that the application and administration of security
practices are undertaken in an ethical manner
• Multidisciplinary principle—Ensuring that everyone’s needs, across all
disciplines, are met in the way security is defined and applied
• Proportionality principle—Ensuring that the costs of security are practical and
appropriate to the risk
• Integration principle—Ensuring that security complements and integrates with
other organisational compliance requirements
• Timeliness principle—Ensuring that the response to threats and events is timely
• Assessment principle—Ensuring that risks are assessed on a regular basis
• Equity principle—Ensuring that the rights and dignity of individuals are respected
Rationale:
Information security is achieved by the combined efforts of information
owners, users, custodians, and information security personnel. Decisions made
with due consideration of all relevant viewpoints and technical capabilities can
enhance information security and receive better acceptance.
36
GAISP Version 3.0
Example:
When developing contingency plans, the organization can establish a
contingency planning team of information owners, representatives from
facilities management, technology management, and other functional areas in
order to better identify the various expectations and viewpoints from across the
organization and other recognized parties.
Broad functional principles are described as the building blocks that provide
guidance for operational accomplishment of pervasive principles. There are 14
broad functional principles and GAISP contains a table showing how they address
the nine pervasive principles. Each of the 14 broad functional principles is
described in a brief paragraph and is accompanied by a longer rationale and
example of the principle in practice. The 14 broad functional principles are
generally self-explanatory and are:
• Information security policy
• Education and awareness
• Accountability
• Information asset management
• Environmental mmanagement
• Personnel qualifications
• Incident management
• Information systems life cycle
• Access control
• Operational continuity and contingency planning
• Information risk management
• Network and Internet security
• Legal, regulatory and contractual requirements of information security
• Ethical practices
Rationale:
In order to assure that information assets are effectively and uniformly secured
consistent with their value and associated risk factors, management must
clearly articulate its security strategy and associated expectations. In the
absence of this clarity, some resources will be under-secured—that is,
ineffective; other resources will be over-secured—that is, inefficient.
37
Information Security Harmonisation—Classification of Global Guidance
References
www.gaisp.org
www.issa.org
5
National Research Council; Dr. David Clark (MIT), committee chair; Computers at Risk, National
Academy Press, 1991
38
The Standard of Good Practice for Information Security
Document Taxonomy
The standard is a collection of information security principles and control practices
that was generated by members of ISF. The precursor to ISF was the European
Security Forum (ESF).
Circulation
The standard was previously known and available only to ISF members, but it was
made publicly available a few years ago and since has begun to build a wider
recognition.
39
Information Security Harmonisation—Classification of Global Guidance
Target Audience
The standard is specifically aimed at major national and international organisations
although the ISF believes it is also likely to be of use to any organisation regardless
of industry, geographic location or size. It is also likely to be of practical use to
information security practitioners, IT management and assurance professionals.
Timeliness
It is planned to be updated every two to three years and a specific aim is to ensure
that the latest security “hot topics” are addressed. The ISF produced version 4 of the
Standard of Good Practice for Information Security in March 2003.
Certification Opportunities
No certification is available. However, ISF (corporate) members can benchmark
their performance against the standard through ISF’s biannual information security
status survey.
Completeness
The standard provides a broad and detailed range of security principles, control
objectives and security practices. It is particularly aimed at large organisations of
any industry type in any geographic location.
The standard does not deal with security management concepts nor provide
guidance on how to select appropriate controls. If it is to be used, it needs to be
applied by an experienced security practitioner or in combination with other
guidance publications.
Availability
The standard is publicly available as a free download at
www.isfsecuritystandard.com.
Recognition/Reputation
Results from the ISACA global survey of 5,000 CISMs (described in this
document’s Introduction) revealed that this standard is generally well recognised
(approximately two-thirds of surveyed CISMs) although slightly less so in the
Oceania region. However, the majority (55 percent) of CISMs familiar with the
publication feel it has only limited acceptance as a standard.
40
The Standard of Good Practice for Information Security
Usage
Of those familiar with the standard, at least one-fifth are actively using it in some
form or another (i.e., implemented, used as best practice or used for assessment)
within their organisation. Usage is practised by almost one-third in Europe/Africa.
A good majority (73 percent) of surveyed CISMs familiar with its contents believe
the standard has a good level of comprehensiveness and it is also generally
considered to be effective in use.
Risk Management, 2
It provides a good list of risk analysis requirements throughout the organisation. It
does not describe approaches and methods of risk management.
Response Management, 1
It defines the requirement for response management but provides very little that
would help an information security manager develop and maintain a response
management capability.
41
Information Security Harmonisation—Classification of Global Guidance
Overall, 2
This is a good source of controls and detailed control practices for the experienced
information security practitioner. Those with less experience may find it
overwhelming and have difficulty deciding which control practices are appropriate
for their own organisation.
The standard’s framework splits information security management into five distinct
aspects, each of which covers a particular type of environment:
• Security management (enterprisewide)—High-level direction and control
• Critical business applications—Risks and protection of applications
• Computer installations—Requirements for the setup and running of computer
services
• Networks—Requirements for the setup and running of networks
• Systems development—Incorporation of security requirements into new systems
The five aspects are broken into a number of supporting areas, which are then
further broken into sections containing a principle and objective. Suggested practice
statements advising on how each principle and objective can be met, usually
between four and six statements per section, are also provided. A detailed second
index addressing a wide range of security-related topics provides easy reference to
every practice statement. As each of the five aspects is designed to be complete
within its own right, some sections (e.g., risk analysis) are repeated, with the
practice statements being varied accordingly. The structure of the standard is shown
in figure 5.
42
The Standard of Good Practice for Information Security
?
Aspect
e.g., a critical business
application
Section 1.1 Section 1.2 Section 1.3 Section 2.1 Section 3.1 Section 3.2
Good Practice
Good Practice
Good Practice
Good Practice
Good Practice
Good Practice
Statement of
Statement of
Statement of
Statement of
Statement of
Statement of
Source: Information Security Forum, The Standard of Good Practice for Information Security,
Version 4.1, January 2005
43
Information Security Harmonisation—Classification of Global Guidance
The standard addresses the following major topic areas under each aspect:
• Security management
– Establishing, documenting and communicating direction and commitment for
information security
– Making the organisational arrangements necessary for managing and applying
security throughout the enterprise
– Establishing classification and ownership schemes for information assets
– Defining arrangements for a secure environment
– Taking steps for protection from and response to malicious attacks
– Including special topics: e-mail, cryptography, PKI and outsourcing
– Ensuring adequate audit, review and monitoring of the security environment
• Critical business applications
– Assessing the security requirements of an application
– Managing applications, including roles and responsibilities, internal controls,
change management, and continuity planning
– Controlling access to applications
– Ensuring that applications are adequately supported and backed up
– Addressing practices for application security co-ordination, classification, risk
analysis and review
– Including special topics: third-party agreements, key management and
web-enabled applications
• Computer installations
– Running and monitoring the computer installations to a desired level
– Designing and configuring the live environment
– Ensuring basic controls over the operations of systems
– Controlling access to information and systems in the computer installation
– Addressing practices for computer installation security co-ordination,
classification, risk analysis and review
– Developing, maintaining and validating contingency plans
• Networks
– Designing and running computer networks to a desired level
– Ensuring that unauthorised network traffic is prevented
– Managing and monitoring network performance and resilience
– Addressing practices for network security co-ordination, classification, risk
analysis and review
– Ensuring the security of voice networks
• Systems development
– Managing the systems development process, environment and staff
44
The Standard of Good Practice for Information Security
Reference
www.isfsecuritystandard.com
45
Information Security Harmonisation—Classification of Global Guidance
46
ISO/IEC 13335 Information Technology—Guidelines for the Management of IT Security
Document Taxonomy
ISO/IEC 13335 Information Technology—Guidelines for the Management of IT
Security is a collection of five technical documents that provide guidance on aspects
of information security management.
Circulation
The guidance is known and recognised globally by the information security
community. Parts of it have been in existence since 1996.
47
Information Security Harmonisation—Classification of Global Guidance
Target Audience
The guidance is applicable to organisations of all types, size and geographic
location. Part 1, containing the management aspects of IT, explicitly addresses
senior management and information security managers, whereas the other parts
target individuals responsible for the implementation of security measures, for
instance, IT managers and IT security staff.
Timeliness
Dates of publication range from 1996 (part 1) to 2001 (part 5). Parts 1 and 2 have
been revised into a new part 1 titled “Concepts and Models for ICT Security
Management”, which is to be published in 2006. Parts 3 and 4 are at an early stage
of redevelopment and will be made into a new part 2 titled “Techniques for
Information Security Risk Management”. Part 5 is also in the early stages of
redevelopment.
Certification Opportunities
There is no specific certification available.
Completeness
ISO/IEC 13335 contains comprehensive guidance on managing IT security;
however, this does not detract from its general validity or usefulness. The guidance
could be used by organisations of any type or size, although small organisations
may find the level of detail overwhelming.
48
ISO/IEC 13335 Information Technology—Guidelines for the Management of IT Security
There is a good list of safeguards provided in part 4, although purely due to its age
(part 4 was published in 2000), these may not fully address all of today’s technical
risks.
Availability
The documents can be purchased from ISO at www.iso.org (where prices range
between Swiss CHF 73.00 and 158.00 depending on the portion ordered), and from
the American National Standards Institute (ANSI) at http://webstore.ansi.org
(prices from US $58.00 to US $125.00 depending on the part ordered).
Recognition/Reputation
Results of the ISACA global survey of 5,000 CISM holders (described in this
document’s Introduction) indicated that the guidance is known to at least 60 percent
of surveyed CISMs, with recognition levels in Oceania particularly high at 85
percent. Figures for North America and Asia are surprisingly low for such a long-
established international standard. The majority (60 percent) of those CISMs
familiar with the guidance felt it has only limited acceptance within the information
security community.
Usage
More than one-quarter of surveyed CISMs in Oceania actively use the guidance
(i.e., implemented, used as best practice or used for assessment). The level of usage
is much lower in other areas (as low as 11 percent in Central/South America). Of
those CISMs familiar with it, at least half consider it both comprehensive in its
coverage and effective in use.
Risk Management, 3
The guidance provides good fundamentals for information security risk
management but it stops short of providing the detail that would be required for an
appropriate methodology to be developed and used within an organisation.
49
Information Security Harmonisation—Classification of Global Guidance
Response Management, 1
Response management is referenced but not in any detail.
Overall, 4
The guidance is recommended as an excellent source of guidance for those involved
in the management of information security.
The requirements for the definition of a policy, the identification of roles and
responsibilities, systematic risk management, configuration and change
management, contingency/disaster recovery planning, selecting and implementing
safeguards, and follow-up activities are all described at a high level that is suitable
for senior managers not involved in IT security or those just beginning to work in
IT security.
Part 1 identifies how corporate objectives, strategies and policies influence the
organisation’s general security objectives, strategies and policies, which in
themselves form the basis for the narrower set of IT security objectives, strategies
and policies. IT system security objectives, strategies and policies are derived from
the more general level of overall IT security.
50
ISO/IEC 13335 Information Technology—Guidelines for the Management of IT Security
51
Information Security Harmonisation—Classification of Global Guidance
Strategic options for a risk management strategy are presented thereafter. The
specific advantages and disadvantages are addressed. The approaches are:
• Baseline approach—By selecting a set of safeguards to all systems, a baseline
protection level is achieved.
• Informal approach—A pragmatic risk analysis for all systems, it requires
experience of individuals and seems to be suitable for small organisations.
• Detailed risk analysis—A detailed analysis begins with the identification and
valuation of assets, the threats to those assets, a selection of appropriate
safeguards and the identification of an acceptable level of residual risk.
• Combined approach—Using the detailed approach at a high level identifies
systems with a high risk, which are analysed in a more comprehensive manner.
The other systems are appropriate for a baseline protection approach.
Following the discussion of risk management, other issues briefly mentioned are:
• IT system security policy—Contents and endorsement
• IT security plan—Documentation of actions to be taken for implementing the IT
security policy
• Implementation of safeguards—Implementing the safeguards as defined in the
plan, including security training
• Security awareness—Passing the knowledge from the security officer to all levels
of the organisation
• Follow-up—Activities such as maintenance of safeguards and policies, security
compliance checking, monitoring and incident handling
52
ISO/IEC 13335 Information Technology—Guidelines for the Management of IT Security
Internal or external experts ensure the achievement of the objectives by closing the
implementation phase with an approval of the implemented systems. Part 3
concludes with a discussion of follow-up activities, such as maintenance,
compliance checking, change management, monitoring and incident handling. In
the annex, after the aforementioned table of contents of a security policy, a
comprehensive list of possible threat types and vulnerabilities and a description of
a risk analysis method are provided.
53
Information Security Harmonisation—Classification of Global Guidance
54
ISO/IEC 13335 Information Technology—Guidelines for the Management of IT Security
No specific threats are listed in the report, only such exemplary threats as account
sharing; lack of traceability; masquerading user identity; software failure;
unauthorised access to computers, data and applications; or a weak authentication
of identity.
55
Information Security Harmonisation—Classification of Global Guidance
References
www.iso.org
http://webstore.ansi.org
56
ISO/TR 13569:1997 Banking and Related Financial Services—
Information Security Guidelines
Document Taxonomy
The guidance Banking and Related Financial Services—Information Security
Guidelines is a technical report containing guidelines on security concepts and
suggested control objectives and solutions for financial sector organisations.
Circulation
This guidance is recognised internationally, but more so by the banking and
financial services industry at which it is specifically aimed.
57
Information Security Harmonisation—Classification of Global Guidance
Target Audience
The guidance is intended for use by financial institutions of all sizes and types and
by providers of service to financial institutions.
Timeliness
The first edition of ISO/TR 13569:1997 was issued in 1996 and then reissued in
1998. It has not been updated since. Most of its content is still valid and relevant but
it should be noted that, due to technology changes, parts of the document are either
stale or outdated. A new version of the standard is currently under development
with no date given for expected completion.
Certification Opportunities
There is no certification associated with the guidance.
Completeness
The majority of the guidance is concerned with documenting control objectives and
controls for the financial services sector and in this it covers a broad range of areas,
many of which are specific to financial services (e.g., automated teller machines).
Its age means that the controls are light for many technical areas; for instance,
networking of trusted third parties (TTPs) was a new concept at the time of issue in
1996, and there is no mention of Internet banking. However, most of the controls
remain appropriate as a source of commonly accepted security practices.
Availability
The documents can be acquired from the ISO web site, www.iso.org, at a cost of
Swiss CHF 184.00.
58
ISO/TR 13569:1997 Banking and Related Financial Services—
Information Security Guidelines
Recognition/Reputation
Results of the global CISM survey that was conducted by ISACA in 2004
(described in this document’s Introduction) indicate that the document is less known
than some of the others reviewed for this research. However, the ISO standard still
scored a reasonable 60 percent recognition level amongst surveyed CISMs (only 50
percent in Asia). However, the majority (59 percent) of those CISMs familiar with
the guidance believe it has only limited acceptance as a standard.
Usage
The IT guideline is being put to practical use (i.e., implemented, used as best
practice or used for assessment) by less than 15 percent of CISMs (only 2.5 percent
in Central/South America), but that could be due to its emphasis on financial
institutions. Over half of CISMs familiar with the guidance found it effective in use
(rising to almost 90 percent in Oceania). Whilst more than half also found it
comprehensive, this figure fell to only 36 percent in Oceania.
Risk Management, 3
The guidance provides a simple risk assessment methodology that could easily be
used and adapted by anyone. It may not provide the level of detail required for
evaluating very high-risk systems and it does not address all the aspects of risk
management.
59
Information Security Harmonisation—Classification of Global Guidance
Response Management, 1
Response management is referenced in the guideline, but only limited guidance is
provided.
Overall, 2
ISO/TR 13569:1997 is a valuable reference source of control practices, particularly
for financial organisations, but since it was last published in early 1998, it is dated.
The guidance is split into nine sections and a number of annexes. The first sections
deal with introductions, references, executive summary, etc. Section 6 of the
guideline describes the components of an information security programme:
• General duties—Responsibilities for a range of roles within the organisation,
including directors, managers, employees, legal and security
• Risk acceptance—Process for accepting risks that fall outside the organisation’s
policies, standards and directives
• Insurance—Liaising with others to ensure that insurance conditions are
understood and can be dealt with, and insurance premiums are kept to a minimum
• Audit—Describes the activities of audit in the area of information security
• Regulatory compliance—Liaising with others to ensure that the information
security requirements of regulations are understood and implemented
• Disaster recovery planning—Activities within a disaster recovery plan to recover
information and information processing facilities
• Information security awareness—Ensuring that the awareness programme
achieves a balance of control and accessibility
• External services providers—Including Internet service providers, red-teams
(penetration testers) and electronic money token providers
• Cryptographic operations—Benefits and issues in selecting and using
cryptographic controls
• Privacy—Areas that should be addressed through policies and procedures
As computer systems become more and more complex, security will become
increasingly harder to maintain. Use of red-teams can help in finding specific
points of weakness in an institutions system.
60
ISO/TR 13569:1997 Banking and Related Financial Services—
Information Security Guidelines
Section 7 addresses control objectives and suggested solutions. In this part of the
guideline, there are 20 main topic areas, many broken down into further topics, as
follows:
• Information classification, including suggested labels and descriptions for
criticality and sensitivity
• Logical access control, further broken into a number of topics
• Audit trails
• Change control (including emergency procedures)
• Computers
• Networks
• Software
• Human factors
• Voice, telephone and related equipment
• Facsimile and image
• Electronic mail
• Paper documents
• Microform and other media storage (disclosure, destruction, etc.)
• Financial transaction cards (physical security, abuse, PINS, audit, etc)
• Automated teller machines (user identification, fraud prevention,
maintenance, etc.)
• Electronic fund transfers
• Checks
• Electronic commerce
• Steganography
• Electronic money
Reference
www.iso.org
61
Information Security Harmonisation—Classification of Global Guidance
62
ISO/IEC 15408:1999 and Common Criteria
Issuer
ISO/IEC 15408:1999 was published in 1999 by the ISO/IEC JTC1 working group
in collaboration with the Common Criteria Project Sponsoring Organisation, which
published Common Criteria. Members of this organisation are:
• Canada—Communications Security Establishment
• France—Service Central de la Sécurité des Systèmes d’Information
• Germany—Bundesamt für Sicherheit in der Informationstechnik
• Netherlands—Netherlands National Communications Security Agency
• United Kingdom—Communications-Electronics Security Group
• United States—National Institute of Standards and Technology and National
Security Agency
63
Information Security Harmonisation—Classification of Global Guidance
Document Taxonomy
ISO/IEC 15408:1999 is an international standard. Common Criteria is labelled as a
multipart standard.
Circulation
Because it was developed by an international committee and published as an
international standard, Common Criteria has gained worldwide recognition.
Target Audience
CC describes three specific target audiences, with a fourth having some tangential
targeting. They are:
• Consumers—The needs of consumers are considered throughout the evaluation
process. The level of security provided by an evaluated product is comprehensible
for consumers.
• Developers—Developers have a guideline to prepare the evaluation of their
systems. On the other hand, CC helps in identifying security requirements. CC can
be useful as a source of security functions that may be implemented into a system.
64
ISO/IEC 15408:1999 and Common Criteria
Timeliness
ISO/IEC 15408:1999 was first published in 1999 and is now somewhat out of
step with the latest Common Criteria version 2.2, published in 2004 (CC2.2) If
the past serves as an indicator, it seems likely that CC2.2 (following some minor
editorial changes) will be accepted as the new version of ISO/IEC 15408, perhaps
by 2006.
Certification Opportunities
The purpose of the document is to provide common criteria for the certification of
security products and systems.
Completeness
There is a detailed description of the criteria that must be fulfilled to obtain
certification of security products and systems. It does not describe the full role and
responsibilities of an information security manager for establishing, implementing
and maintaining an enterprisewide information security programme. Whilst the
document contains security controls, they are not in a format that would make them
easy to find and use by the average organisation defining security controls for itself.
Availability
The international standard can be purchased from ISO at www.iso.org for
Swiss CHF 142.00, 294.00 and 230.00 for parts 1, 2 and 3 respectively. Common
Criteria is freely available for public use from www.nist.gov and
www.commoncriteriaportal.org.
Recognition/Reputation
Referring to the global survey of CISMs conducted in 2004 (described in this
document’s Introduction), two-thirds of surveyed CISMs are aware of the Common
Criteria, slightly more in the Europe/Africa and Oceania regions. Well over half of
all CISMs familiar with the CC felt it had only limited acceptance in the
65
Information Security Harmonisation—Classification of Global Guidance
Usage
CC is being used (mostly as best practice or for assessment) by approximately one-
fifth of surveyed CISMs except in Central/South America and Asia where usage is
quite low (5 and 11 percent, respectively). It is considered by more than half of
CISMs familiar with the standard to be comprehensive. At the same time, however,
half the CISMs in Europe/Africa and Central/South America felt it had only limited
effectiveness—again, most likely due to the focus on security products.
Risk Management, 0
Risk management is not addressed at all in the guidance.
Response Management, 0
Response management is not addressed at all in this guidance.
Overall, 2
This guidance would mostly be of use to a security engineer as the level of technical
detail is much greater than that of normal interest to an information security
manager with enterprisewide responsibilities. The exception may be in
organisations developing security products.
66
ISO/IEC 15408:1999 and Common Criteria
Instructions for writing high-level specifications for products and systems are
provided in two annexes. Annex A addresses security targets and annex B addresses
protection profiles. A security target contains the IT security requirements of an
identified TOE and specifies the functional and assurance security measures
offered by that TOE to meet stated requirements. A protection profile defines an
implementation-independent set of IT security requirements for a category of
TOEs.
67
Information Security Harmonisation—Classification of Global Guidance
68
ISO/IEC 15408:1999 and Common Criteria
• AGD—Guidance documents
– AGD_ADM—Administrator guidance
– AGD_USR—User guidance
• ALC—Life cycle support
– ALC_DVS—Development security
– ALC_FLR—Flaw remediation
– ALC_LCD—Life cycle definition
– ALC_TAT—Tools and techniques
• ATE—Tests
– ATE_COV—Coverage
– ATE_DPT—Depth
– ATE_FUN—Functional tests
– ATE_IND—Independent testing
• AVA—Vulnerability assessment
– AVA_CCA—Covert channel analysis
– AVA_MSU—Misuse
– AVA_SOF—Strength of TOE security functions
– AVA_VLA—Vulnerability analysis
70
ISO/IEC 15408:1999 and Common Criteria
References
www.iso.org
www.iec.org
www.nist.gov
www.commoncriteriaportal.org
71
Information Security Harmonisation—Classification of Global Guidance
72
ISO/IEC 17799:2000 Information Technology—Code of Practice
for Information Security Management
Document Taxonomy
ISO/IEC 17799:2000 is a collection of information security practices, and is based
on British Standard BS 7799-1:1999, Code of Practice for Information Security
Management.
Circulation
ISO/IEC 17799:2000 is available and used internationally. It has been published in
several languages including Chinese, Czech, Danish, Dutch, Finnish, French,
German, Icelandic, Japanese, Korean, Norwegian, Portuguese and Swedish.
73
Information Security Harmonisation—Classification of Global Guidance
Target Audience
During the drafting of ISO/IEC 17799:2000 it was assumed that the execution of its
provisions would be entrusted to appropriately qualified and experienced people.
As all of the contents are considered guidance as opposed to mandatory
requirements, it is assumed that the individual implementing ISO/IEC 17799:2000
will have the experience needed to evaluate and apply controls as they relate to the
specific risks and needs of their organisation.
Timeliness
ISO/IEC 17799:2000 is a first edition, currently being reviewed as part of the
normal three-to-five-year ISO revision process. Whilst the majority of its contents
remain valid, changes in IT inevitably have meant that some of the guidance may
be dated or incomplete. A new version has already been developed and is expected
for publication within 2005.
Certification Opportunities
There is no certification available for ISO/IEC 17799:2000. However, it can be used
as guidance for those wishing to achieve certification to BS 7799-2:2002.
Completeness
ISO/IEC 17799:2000 is designed to be comprehensive to a level that meets the
needs of the majority of organisations, from small to large, and across industry
sectors. As a set of control objectives and security practices it has good coverage
although it does not deal with technology changes that have taken place over the last
four or five years. Security management concepts are only briefly addressed.
Availability
ISO/IEC 17799:2000 can be purchased from ISO at www.iso.org for Swiss CHF
172.00, as well as from many national standards bodies.
74
ISO/IEC 17799:2000 Information Technology—Code of Practice
for Information Security Management
Recognition/Reputation
Findings from the global CISM survey that was conducted by ISACA in 2004
(described in this document’s Introduction) indicate that ISO/IEC 17799:2000 has
made a significant impact on the information security community, and was
recognised by more than 97 percent of the surveyed CISMs. Acceptance levels of
the standard are also very high: more than 85 percent of the surveyed CISMs
(falling to 65 percent in North America) believed it to be an acceptable standard,
whilst most of the remaining CISMs thought it has at least limited acceptance.
Usage
As the survey indicated, active usage (i.e., implemented, used as best practice or
used for assessment) of the standard is very high at greater than 58 percent, with a
large majority of surveyed CISMs (in excess of 80 percent) finding it
comprehensive.
Risk Management, 1
Some references are made to risk management in the introduction. No further detail
is present.
Response Management, 2
The guidance provides a good list of important control practices for business
continuity, but it does not fully address all areas of this domain nor provide
guidance on how to establish and manage a response management function.
75
Information Security Harmonisation—Classification of Global Guidance
Overall, 2
This is a good source of controls and control practices designed to be used by an
experienced information security practitioner. However, those with less experience
may find it difficult to decide which control practices are necessary.
76
ISO/IEC 17799:2000 Information Technology—Code of Practice
for Information Security Management
77
Information Security Harmonisation—Classification of Global Guidance
– General controls (such as a clear desk and clear screen policy) to protect
information processing facilities or to prevent damage caused by unauthorised
offsite usage of equipment should be in place.
• Communications and operations management
– Operations should follow documented procedures.
– All changes to equipment should be documented.
– Procedures for sound incident management should be defined.
– Duties should be segregated, ensuring that no individual can both initiate and
authorise an event.
– Development and operational facilities should be separated.
– Risks caused by contracted external facilities organisations should be covered.
– Capacity demands should be observed and future demands should be projected.
– Acceptance criteria for new systems should be defined.
– Damage caused by malicious software should be prevented, using preventive
and detective controls, formal policies, and defined recovery procedures.
– Information should be backed up and the backup files tested regularly.
– Activities performed by operational staff and errors should be logged.
– Networks should be set up and managed with a view to ensuring the necessary
level of security.
– Removable media should be handled with special care.
– Media with sensitive information should be disposed of in a secure manner.
– Adequate controls in information handling procedures (e.g., labelling of media,
ensuring completeness of inputs, storage of media) should be considered.
– System documentation should be protected, as it may contain sensitive
information.
– Agreements for the exchange of information and software should be established,
including media in transit, electronic commerce transactions, electronic mail,
electronic office systems, publicly available systems and other forms of
information interchange.
• Access control
– Access to information should be granted in accordance with business and
security requirements.
– A formal access control policy should be in place.
– Access control rules should be specified.
– User access management (registration, privilege management, password
management, review of user access rights) should follow a formal process.
– Responsibilities of users should be clearly defined.
– Networked services, operating systems and applications should be protected
appropriately.
– System access and use should be monitored constantly.
– Mobile computing and teleworking should be performed in a secure manner.
• Systems development and maintenance
– Security issues should be considered when implementing systems, following
defined requirements.
78
ISO/IEC 17799:2000 Information Technology—Code of Practice
for Information Security Management
– Security in application systems should take into account the validation of input
data, adequate controls of internal processing, message authentication and
output data validation.
– Use of cryptographic systems should follow a defined policy.
– Access to system files (including test data and source libraries) should be
controlled.
– Project and support environments should allow for security by being rigorously
controlled (e.g., change management procedures, arrangements for outsourced
development).
• Business continuity management
– A comprehensive business continuity management process should permit
prevention of interruptions to business processes.
– The business continuity management process should not be restricted to IT-
related areas and activities.
– An impact analysis should be executed that results in a strategy plan.
– Business continuity plans should be developed following a single framework.
– Business continuity plans should be tested, maintained and reassessed
continuously.
• Compliance
– Any unlawful act (e.g., data protection acts) should be avoided.
– Compliance with the security policy should be ensured by periodic reviews.
References
www.iso.org
www.iec.org
www.bsi-global.co.uk
79
Information Security Harmonisation—Classification of Global Guidance
80
Security Management
Document Taxonomy
ITIL’s Security Management, published in 1999, is a methodology describing how
IT security management processes link into other IT infrastructure management
processes.
Circulation
Although developed by the UK government, ITIL is used internationally.
81
Information Security Harmonisation—Classification of Global Guidance
Target Audience
The stated audience of Security Management is “anyone responsible for critical IT
processes as well as business managers who may find it helpful in defining their
requirements for security”.
Timeliness
ITIL Security Management has not been updated since 1999. There are some plans
that call for ITIL to begin a scoping process for change in 2005. No further details
were available at the time of publication.
Certification Opportunities
There is no certification for ITIL Security Management, but it is suggested that by
following its guidance (along with that provided in the other ITIL IT services
publications), an organisation would be well placed to obtain certification to
BS 15000 Specification for IT Service Management.
Completeness
Within the scope of ITIL Security Management, security management processes are
well covered and are suitable for any type of organisation with a large or complex
IT infrastructure. However, ITIL does not extend outside the management of the IT
infrastructure, meaning this is not an ideal publication for establishing an
enterprisewide security function.
The document includes a number of control practices but not to great depth, instead
referring the reader to ISO/IEC 17799:20006 for more detailed information.
6
ITIL actually uses the term “BS 7799” and refers to the 1995 and draft 1999 versions of the Code of
Practice that eventually evolved into BS 7799-1:1999 and then ISO/IEC17799:2000. No mention is
made by ITIL of BS 7799-2:2002, which was published much later than ITIL Security Management.
82
Security Management
Availability
ITIL Security Management can be purchased from The Stationery Office (TSO) in
the UK (online at www.tso.co.uk). The cost is GB Sterling £44.95.
Recognition/Reputation
Based on the ISACA global survey of CISMs (described in this document’s
Introduction), ITIL has wide international recognition (around 85 percent of the
surveyed CISMs) although slightly less so in North America (68 percent). More
than half of all CISMs felt the standard has only limited acceptance, although 35
percent felt it has wide acceptance.
Usage
The CISM survey results showed that ITIL is actively used (i.e., implemented, used
as best practice or used for assessment) by 40 percent in the Oceania and
Europe/Africa regions. Usage is also strong (more than 23 percent) in other regions.
It is considered by most to be effective in use (except for Oceania with half feeling
it has only limited effectiveness). More than half of those familiar with ITIL felt it
is either “somewhat comprehensive” or “comprehensive”.
Risk Management, 0
Risk management is rarely addressed within this document.
83
Information Security Harmonisation—Classification of Global Guidance
Response Management, 1
References are made to security incident registration and problem management, but
not to any great level.
Overall, 2
This is most likely to be of interest to an information security manager if the
organisation is implementing ITIL or plans to apply for BS 15000 certification. Its
main audience is likely to be IT managers.
Chapter 1 provides a brief introduction to the document, and chapter 2 describes the
basics of security management. The third chapter describes the links to other ITIL
processes. Chapter 4 covers measures and chapter 5 provides guidelines for
implementing the security management function. There are also five useful
annexes.
Reporting is then used to link back to the customer, confirming that security
arrangements within SLAs have been met.
84
Security Management
ITIL defines its processes under “sets” and the relationship with security
management is described in each case in varying detail. There are three sets:
• Manager’s set—The strategic layer that is important with regard to the
organisation of information security activities of the IT service provider
• Service delivery set—Represents the tactical processes where SLAs are drawn up
and service provided. Other processes that link with security management are:
– Service level management
– Availability management
– Performance and capacity management (including workload, resource and
demand management)
– Business continuity planning
– Financial management and costing
• Service support set—The operational layer that provides beneficial processes for
service delivery and includes links to:
– Configuration and asset management
– Incident control/help desk
– Problem management
– Change management
– Release management
85
Information Security Harmonisation—Classification of Global Guidance
Control measures are also defined for the auditing and evaluation of security in IT
systems, maintenance and reporting. Annex A provides a cross-reference table
providing an easy reference to the areas covered and not covered by ITIL.
Extract of Some of the Possible Reports a Security Manager May Provide into the
Service Level Management Process
• Reports on the Plan activity:
– Reports on conformance to the SLA including the agreed upon KPIs for
security
– Reports on underpinning contracts and any disconformities in their
fulfilment
– Reports on operation level agreements and policy statements
86
Security Management
Annexes
• Annex A provides a cross-reference table showing the relationship between ITIL
and ISO/IEC 17799:2000. Annex A recommends the use of ISO/IEC 17799:2000
when implementing Security Management.
• Annex B provides a specimen security section in the SLA.
• Annex C describes a framework that can be used in drawing up a security plan.
• Annex D is a reference showing the various documents that were referred to in
drawing up Security Management, potentially useful web sites and a list of other
ITIL books.
Reference
www.tsoonline.co.uk
87
Information Security Harmonisation—Classification of Global Guidance
88
NIST 800-12 An Introduction to Computer Security—The NIST Handbook
Document Taxonomy
NIST 800-12 An Introduction to Computer Security—The NIST Handbook
describes the common requirements for managing and implementing a computer
security programme and some guidance on the types of controls that are required.
Circulation
The guidance is published by a US government department, thus it is more
commonly used by US organisations. However, the NIST series of security
publications is internationally known by the information security industry. NIST is
also the US representative in Common Criteria guidance.
89
Information Security Harmonisation—Classification of Global Guidance
Target Audience
The guidance states that it is aimed at those with responsibilities for computer
security, particularly those in US government organisations. However, the majority
of its contents could be applicable to any individual with information security
responsibilities.
Timeliness
The guidance is somewhat dated on the controls side, having been produced in
1995. However, its overall guidance on a computer security programme remains
valid. No updates have been published.
Certification Opportunities
No certification is available for NIST 800-12.
Completeness
Although it was designed primarily for US government agencies, it is also
considered appropriate for organisations of any type or size. Many of the references
are US-specific, but this should not be a major problem for non-US readers. The
controls are somewhat dated and are provided at a relatively high level compared
with guidance available in other publications. Despite this, it does a good job of
meeting its stated objectives.
Availability
The guidance is posted for complimentary download electronically from the CSRC
web site, www.csrc.nist.gov. Printed versions are not available.
90
NIST 800-12 An Introduction to Computer Security—The NIST Handbook
Recognition/Reputation
Based on the results of the global CISM survey conducted in 2004 (described in this
document’s Introduction), the guidance is well recognised by more than 60 percent
of surveyed CISMs globally, particularly in North America (85 percent). Around
half of the surveyed CISMs felt the guidance has only limited acceptance although
responses from North America were much more positive.
Usage
The guidance is actively used (i.e., implemented, used as best practice or used for
assessment) by one-third of all North American CISMs and also by many in
Central/South America. The application levels are quite low (less than 14 percent)
in other areas. Despite this low usage outside the Americas, more than half of all
CISMs familiar with the publication considered it to be comprehensive and
effective.
Risk Management, 3
The guidance provides good descriptions of risk management concepts, but it does
not provide direction on how to carry out risk assessments.
Response Management, 3
It provides good guidance on the components of contingency planning, but it does
not go fully into response management nor cover forensics.
91
Information Security Harmonisation—Classification of Global Guidance
Overall, 4
NIST 800-12 is a good guideline that covers many aspects of information security
management. It is focussed on the US government and may be somewhat
cumbersome for small, commercial organisations, but overall it is a valuable source
of guidance. It would benefit from being updated as it was last published in 1995.
92
NIST 800-12 An Introduction to Computer Security—The NIST Handbook
Another chapter within section I provides ideas on how roles and responsibilities
for security may be allocated within an organisation. These roles and
responsibilities are nonprescriptive, and it is recognised within the handbook that
they will vary depending on many factors, including size of organisation. Examples
are given for 18 typical roles, including senior management, audit, quality
assurance, help desk, system management and administration.
Common threats to information are explained under nine headings, including fraud
and theft, employee sabotage, malicious hackers, malicious code, errors and
omissions, and espionage.
Sections II, III and IV address controls that have been divided into three areas:
management, technical and operational. Section II contains management controls
and these are divided into a number of chapters, each addressing a specific area.
93
Information Security Harmonisation—Classification of Global Guidance
94
NIST 800-12 An Introduction to Computer Security—The NIST Handbook
Assurance Chapter
The handbook defines computer security assurance as “the degree of confidence
one has that the security measures, both technical and operational, work as intended
to protect the system and the information it processes”. This chapter examines both
accreditation and assurance, describing objectives, methods and when assurance is
required within planning, design, implementation and operations of systems. Many
tools and methods for obtaining assurance (e.g., penetration testing and automated
tools) are described.
95
Information Security Harmonisation—Classification of Global Guidance
It describes the different objectives, suggested teaching methods and impacts for
awareness, education and training and provides a seven-step approach to
implementing a programme to address all three:
• Identify programme scope, goal and objectives.
• Identify training staff.
• Identify target audiences.
• Motivate management and employees.
• Administer the programme.
• Maintain the programme.
• Evaluate the programme.
96
NIST 800-12 An Introduction to Computer Security—The NIST Handbook
geographic location and the services supporting facilities (human and technical)—
and recognises that variations mean that the likelihood of some threats will differ.
Amongst the threats considered are physical damage to buildings, intruders
(physical) and physical theft.
Section IV addresses technical controls and is, again, split into a number of
chapters.
97
Information Security Harmonisation—Classification of Global Guidance
Cryptography Chapter
This chapter explains the differences between secret and public key cryptography,
and common applications for their use, including integrity checking and digital
signatures. Guidance is also provided on selection and implementation issues such
as hardware vs. software, key management and export controls.
References
www.nist.gov
www.csrc.nist.gov
98
NIST 800-14 Generally Accepted Principles and Practices for
Securing Information Technology Systems
Document Taxonomy
NIST 800-14 Generally Accepted Principles and Practices for Securing
Information Technology Systems is a collection of principles and practices to
establish and maintain system security. It is labelled as a special publication and is
one of a series of three produced by NIST. The other two are:
• NIST 800-12 An Introduction to Computer Security—The NIST Handbook
(October 1995)
• NIST 800-18 Guide for Developing Security Plans for Information Technology
Systems (December 1998)
Circulation
The NIST 800-14 guidance was published by a US government department, thus it
is more commonly used by US organisations. However, the NIST series of security
publications is internationally known by the information security industry.
99
Information Security Harmonisation—Classification of Global Guidance
Target Audience
NIST 800-14 targets management, security practitioners, users, system developers
and internal auditors. Thus, it explicitly addresses all parties responsible for IT
security. When following the document, the security principle and practices are to
be applied for governmental IT systems, particularly for systems of e-governance.
Timeliness
The document was published in September 1996, and no subsequent revision is
available. However, the majority of contents are high-level and still relevant.
Certification Opportunities
Certification to these principles is not available.
Completeness
NIST 800-14 describes at a high level the issues that must be considered in
selecting appropriate policy and controls for an organisation. It does not provide the
level of detail an organisation would need in deciding on appropriate security
controls and practices, instead providing more of a framework. It provides a good
foundation for those new to information security management albeit more IT-
focussed than many modern approaches to the subject.
Availability
The guidance is posted for complimentary download electronically from the CSRC
web site at www.csrc.nist.gov.
100
NIST 800-14 Generally Accepted Principles and Practices for
Securing Information Technology Systems
Recognition/Reputation
The results produced by a global CISM survey conducted in 2004 (described in this
document’s Introduction) showed that NIST 800-14 is highly recognised in North
America (80 percent). However, it scored only slightly more than half (55 percent)
in Europe/Africa and Asia. The guidance was also considered to have only limited
or no acceptance by a huge majority (88 percent) of CISMs except, again, in North
America where acceptance levels are higher but still are not overwhelming.
Usage
The global CISM survey showed that NIST 800-14 is being actively used (i.e.,
implemented, used as best practice or used for assessment) by more than one-third
of North American CISMs but levels in Oceania, Europe/Africa and Asia show very
low usage, at less than 15 percent. Despite this low usage, it is considered by more
than half of all CISMs familiar with it to be comprehensive and effective.
Risk Management, 1
The guidance describes a risk management framework, but not in sufficient detail
to undertake risk assessments or make risk-based decisions.
Response Management, 2
It provides a good list of important control practices for business continuity, but it
does not fully address all areas of this domain nor provide guidance on how to
establish or carry out the practices.
101
Information Security Harmonisation—Classification of Global Guidance
Overall, 2
NIST 800-14 is good as an introduction for those new to information security
and/or for briefing and educating IT and business managers. It would be
particularly useful for smaller organisations or those that have never addressed
information security.
Each of the principles applies to each of the practices although their relationship
varies. The 14 common practices in IT security are meant as a companion to the
NIST Special Publication 800-12 An Introduction to Computer Security—The NIST
Handbook. NIST 800-14 describes itself as the “broad overview of computer
security and an excellent primer,” with NIST 800-12 providing the “what” and
“why to” and a template for deriving the practices.
Each of the 14 practices is to a level that would allow a security manager to put
together an information security programme framework, and these practices are
also considered the minimum required for any organisation. Most of the practices
provided in the guideline are quite common and the style is similar to the
international standard ISO/IEC 17799:2000, which was used as a reference during
the development of the practices in NIST 800-14 and is recommended as further
reading.
102
NIST 800-14 Generally Accepted Principles and Practices for
Securing Information Technology Systems
103
Information Security Harmonisation—Classification of Global Guidance
References
www.nist.gov
www.csrc.nist.gov
104
NIST 800-18 Guide for Developing Security Plans for Information Technology Systems
Document Taxonomy
NIST 800-18 Guide for Developing Security Plans for Information Technology
Systems is the third in a trilogy of NIST publications on IT security and provides
a format and guidance for developing a system security plan. The first
publications are:
• NIST 800-12 An Introduction to Computer Security—The NIST Handbook
(October 1995)
• NIST 800-14 Generally Accepted Principles and Practices for Securing
Information Technology Systems (September 1996)
Circulation
The publication is from a US government department, so it is more commonly used
by US organisations. However, the NIST series of security publications is
internationally known by the information security industry.
105
Information Security Harmonisation—Classification of Global Guidance
Target Audience
The guideline is directed at those with little or no computer security expertise, but
who are responsible for IT security at the system or organisational level. The
concepts are intended to be generic and as such could be used by the private or
public sector. The guideline can also be used as an auditing tool.
Timeliness
The guideline was published in 1998 but still remains valid and appropriate. No
subsequent revision of the document is available.
Certification Opportunities
There is no certification for this guideline.
Completeness
NIST 800-18 provides a comprehensive template and instruction for completing a
security plan. It needs to be used in combination with other reference material and,
by itself, does not describe all of the responsibilities and activities that are likely to
be performed by an information security manager.
Availability
The guidance is posted for complimentary download electronically from the CSRC
web site, www.csrc.nist.gov.
Recognition/Reputation
The results of the global CISM survey (described in this document’s Introduction)
indicate that the recognition of the guideline is very high in North America, at
nearly 85 percent of CISMs, but it falls to a bit more than 50 percent in
106
NIST 800-18 Guide for Developing Security Plans for Information Technology Systems
Europe/Africa and Asia. At least half of CISMs in all regions feel it has at least
limited or wide acceptance as a guideline.
Usage
The CISM survey results indicate that the guideline is actively used (i.e.,
implemented, used as best practice or used for assessment) by one-third of North
America CISMs, but usage is less than 17 percent elsewhere. However, it is
considered by more than half of those familiar with it to be both comprehensive and
effective.
Risk Management, 1
The guidance implicitly addresses some of the activities in this domain but only as
part of the process of creating a security plan.
Response Management, 1
It implicitly addresses some of the activities in this domain but only as part of the
process of creating a security plan.
Overall, 2
This publication was designed to provide guidance on developing a security plan for
a system and it does so very well. It could be a valuable tool but should be used by
an experienced information security practitioner alongside other tools and
methodologies.
107
Information Security Harmonisation—Classification of Global Guidance
The guideline describes the process of system analysis as the first step in creating
a security plan. System analysis is concerned with understanding and defining a
system in enough detail to know what type of security plan will be needed. Within
this step, system boundaries are defined (e.g., whether the system includes PCs
using the application even when they are not directly connected) and the system is
categorised. The guideline has two categories: major application or general support
system. Major application is used for systems performing functions that can be
clearly defined, whilst general support systems are for less tangible systems, such
as LANs and backbones.
Within appendix C of the guideline are security plan templates, one for major
applications and one for general support systems. Each is nine pages long and
contains probing questions that may be asked to complete the template. The
remaining chapters of the guideline provide further guidance on completing the
plan.
108
NIST 800-18 Guide for Developing Security Plans for Information Technology Systems
Management Controls
The guideline explains how to complete the management controls section of the
template. This includes the results of a risk assessment, what types of security
reviews the system has had (or are planned) and rules of behaviour for using the
system. Reference is also made to the five-phase security life cycle (initiation,
development/acquisition, implementation, operation/maintenance, disposal) and
what aspects of the security plan can be considered and documented through each
phase.
Operational Controls
The guideline discusses operational controls for major applications separately from
those for general support systems. In each case, issues to consider and guidance on
decision-making factors are provided. Guidance is provided under the headings of:
• Major applications
– Personnel
– Physical and environment protection
– Input/output controls
– Contingency planning
– Application software maintenance controls
– Data integrity/validation control
– Documentation
– Security awareness and training
• General support systems
– Personnel
– Physical and environment protection
– Input/output controls
– Contingency planning
– Hardware and system software maintenance controls
– Integrity control
– Documentation
– Security awareness and training
– Incident response capability
109
Information Security Harmonisation—Classification of Global Guidance
Technical Controls
Technical controls are also addressed differently in the guide for major applications
and general support systems. Again, in each case, issues to consider and guidance
on decision-making factors are provided. Each considers controls under the
headings of identification and authentication, logical access control and audit trails.
Major applications also considers control for public access.
In addition to the template plans, the appendix also has examples of rules of
behaviour (one for major applications and one for general support systems) in the
form of a document designed to be read and signed by the relevant users.
References
www.nist.gov
www.csrc.nist.gov
110
NIST 800-53 Recommended Security Controls for
Federal Information Systems, Second Public Draft
Document Taxonomy
NIST 800-53 Recommended Security Controls for Federal Information Systems is
a public draft document containing baseline security controls. It is one of a series
of documents published and planned on security for US federal information
systems to be finalised in the first quarter of 2005. NIST 800-53 will be replaced
in 2005 by FIPS Publication 200 Minimum Security Controls for Federal
Information Systems, which will be the mandatory standard for US federal
agencies.
Circulation
The publication is from a US government department, so it is likely to be more
commonly used by US organisations. However, the NIST series of security
publications is internationally known and used by the information security industry.
Although a relatively new document, it is also likely to already have been
considered by a wide audience.
111
Information Security Harmonisation—Classification of Global Guidance
Target Audience
The NIST 800-53 draft dated October 2003 was incomplete when issued for
reviewers to comment. Despite this, extensive feedback was received and the
second draft issued in September 2004 was a shorter but complete version. Draft 2
was also open to comment until November 2004, with the final version expected to
be published in 2005. NIST 800-53 will be of specific interest to any individual
who has security responsibilities and works in a US federal agency. However, it
would be of interest to information security practitioners, IT managers and auditors
in any type or size of organisation.
Timeliness
NIST 800-53 is in final drafting, with the final version due in the first quarter
of 2005.
Certification Opportunities
There is no certification to this guide; however, NIST Special Publication 37
provides guidance on security certification and accreditation of information
systems.
Completeness
NIST 800-53 is focussed on providing security controls; therefore, it does not
describe in any detail the role of the information security manager or the
requirements for establishing, implementing and maintaining an enterprisewide
information security programme. A total of 154 security controls are described,
with guidance and, in many cases, actions to enhance the control for higher risk
systems. The set of controls within draft 2 is shorter and in less detail than those
provided in draft 1.
112
NIST 800-53 Recommended Security Controls for
Federal Information Systems, Second Public Draft
Availability
The draft is posted for complimentary download (as will be the final version) from
the CSRC web site, www.crsc.nist.gov.
Recognition/Reputation
The global survey of CISMs (described in this document’s Introduction) shows that
NIST 800-53 is already known to 80 percent of North American CISMs but
recognition falls to around half in Europe/Africa and Asia. The vast majority (90
percent) of those familiar with it feel it has only limited or no acceptance. The
exception to this is in North America, but, even there more than 50 percent feel it
has only limited acceptance. One can assume this will change when the final
document is published in 2005 and becomes a US government agency mandatory
standard.
Usage
Surprising for a new and still draft document, NIST 800-53 is already being actively
used (i.e., implemented, used as best practice or used for assessment) by almost
one-third of North American CISMs. However, usage figures for other areas are
less than 15 percent. CISMs familiar with NIST 800-53 also generally feel it is (or
will be) comprehensive and effective.
Risk Management, 1
The domain is addressed only lightly in its description of security fundamentals.
113
Information Security Harmonisation—Classification of Global Guidance
Response Management, 1
This domain is addressed only lightly in the document’s description of security
fundamentals.
Overall, 2
This is a good source of controls and control practices designed to be used by US
government agencies. It provides a good source of basic security controls and will
be even more useful when completed in 2005.
114
NIST 800-53 Recommended Security Controls for
Federal Information Systems, Second Public Draft
A major objective of NIST 800-53 is to provide a set of controls for selection and
implementation. There are 154 controls categorised over 17 families, each of which
is given a two-character identifier, as shown in figure 7.
Controls are numbered within each family and each control has three components:
• The control section gives the specific security-related activity or action that is
required to be undertaken. There may be some flexibility for the organisation in
applying the control and this is indicated by assignment and selection options. For
instance, an assignment may enable the organisation to define its own frequency
or time period for reviews. A selection may provide, for instance, four or five
possible actions, of which the organisation must implement at least two.
• Supplemental guidance gives addition detail that an organisation may need to
consider, including applicable federal legislation, directives, etc.
• Controls enhancements provide the additional steps necessary to strengthen the
basic controls when a risk assessment has determined that this is necessary.
115
Information Security Harmonisation—Classification of Global Guidance
Control Enhancements:
(1) The organization employs automated mechanisms to provide centralized
notification of failed security tests.
(2) The organization employs automated mechanisms to support centralized
management of distributed security testing.
116
NIST 800-53 Recommended Security Controls for
Federal Information Systems, Second Public Draft
The draft of appendix G conveniently provides a mapping of the 154 NIST 800-53
controls against ISO/IEC 17799:2000 Code of Practice for Information Security
Management, NIST Special Publication 800-26 Security Self-assessment Guide for
Information Technology Systems, and the US Government Accountability Office
(GAO) Federal Information System Controls Audit Manual.
References
www.crsc.nist.gov
www.nist.com
117
Information Security Harmonisation—Classification of Global Guidance
118
OCTAVE Criteria Version 2.0 Networked Systems Survivability Program
Document Taxonomy
The OCTAVE criteria are a set of principles, attributes and outputs. OCTAVE
Method (18 volumes) and OCTAVE-S (10 volumes) provide a full methodology for
applying the criteria, including detailed process guidelines, worksheets, security
practices and presentation slides. Introduction to the OCTAVE Approach has also
been published.
Circulation
OCTAVE is available and promoted through the CERT organisation of SEI, which
is internationally well known in the information security industry.
119
Information Security Harmonisation—Classification of Global Guidance
Target Audience
OCTAVE is aimed at the individuals within an organisation responsible for
evaluating risks and ensuring appropriate protection strategies are developed and
implemented.
Timeliness
The OCTAVE framework was first published in 1999, and since then, the SEI has
continued to improve and develop the approach and method. The latest issuance
occurred in 2001.
Certification Opportunities
No certification exists for OCTAVE.
Completeness
OCTAVE provides a complete methodology, with supporting documents, for the
evaluation of security risks and selection of practices for the management of these
risks. It has been designed to be suitable for organisations of any type, size or
geographic location.
OCTAVE covers only activities relating to evaluating risks, setting priorities and
selecting controls. It does not address the full role and responsibilities of
information security management.
Availability
OCTAVE documents are freely available from www.cert.org/octave.
120
OCTAVE Criteria Version 2.0 Networked Systems Survivability Program
Recognition/Reputation
According to the global survey of CISMs that was conducted in 2004 (described in
this document’s Introduction), OCTAVE has fairly low recognition amongst
surveyed CISMs compared to many other standards (50 percent, with only 40
percent in Europe/Africa). Acceptance levels are also very low, with less than 10
percent in all regions believing the method to be widely accepted and more than
half believing it has no acceptance whatsoever. This seems to be a very low figure
for such a comprehensive methodology.
Usage
Usage (i.e., implemented, used as best practice or used for assessment) of OCTAVE
is highest in North America and Asia, but still is at only 14 percent. There are
varying opinions on how comprehensive it is considered, with North America,
Europe/Africa and Central/South America coming out at more than 50 percent in
favour of its coverage. Oceania, Central/South America and Asia find it most
effective (60 to 80 percent).
Risk Management, 4
OCTAVE includes a detailed and well-explained methodology for risk management
that can be applied to large and small organisations.
121
Information Security Harmonisation—Classification of Global Guidance
Response Management, 1
It provides a list of important control practices for response, but does not fully
address all areas of this domain or provide guidance on how to establish and
manage a response management function.
Overall, 3
OCTAVE is an excellent methodology designed to involve management and staff at
all levels in selecting and implementing information security controls. It is a bit
detailed, and may be best suited to implementation and integration of security
management.
OCTAVE Criteria
This document (143 pages) contains an introduction and background to OCTAVE
along with a more detailed description of the OCTAVE approach’s three phases and
how they fit into an ongoing process or continuum.
122
OCTAVE Criteria Version 2.0 Networked Systems Survivability Program
The criteria are built on a foundation of principles, attributes and outputs. There are
10 principles that are grouped into three areas:
• Information security risk evaluation principles
1. Self-direction—People within an organisation should manage and direct their
own evaluations and make their own decisions on risk.
2. Adaptable measures—Evaluations must be done through a flexible process to
enable changes in the organisation and technology to be reflected.
3. Defined process—Standardised procedures for evaluation should be used to
ensure consistency in results.
4. Foundation for a continuous process—Good practices should be adopted and
a continuous improvement process should be introduced.
• Risk management principles
5. Forward-looking view—Strategic thinking should identify the impacts of risks
on the organisation’s mission and business objectives.
6. Focus on the critical few—The majority of effort should focus on the most
critical areas to ensure efficient use of resources.
7. Integrated management—Security should be integrated into other
organisation strategies, including consideration of business goals when
deriving security policy.
• Organisational and cultural principles
8. Open communication—Collaborative approaches should be used in
determining risks and communicating them in an open manner.
9. Global perspective—A common view of security should be ensured
throughout the organisation.
10. Teamwork—An interdisciplinary approach, including business and technical
employees, should be undertaken.
There are 15 attributes, each of which has a primary relationship with one or more
of the principles. Each of the attributes is described and an explanation of its
importance is provided:
• Self-direction
– RA.1 Analysis team—Describes a multidisciplinary team of employees and
their responsibilities
– RA.2 Augment analysis team skills—Enables the primary analysis team to find,
when needed, specialist skills from other parts of the organisation or externally
• Adaptable measures
– RA.3 Catalogue of practices—The requirement for a set of practices that
address strategic and operational security, including management practices,
technical security, physical security, etc.
– RA.4 Generic threat profile—Assessment of threats, including system, human
and environmental
– RA.5 Catalogue of vulnerabilities—Technological vulnerabilities and tools for
their identification and evaluation
123
Information Security Harmonisation—Classification of Global Guidance
• Defined process
– RA.6 Defined evaluation activities—Documented procedures for every step of
the evaluation process
– RA.7 Documented evaluation results—Documented risks to the organisation
and strategies for mitigation
– RA.8 Evaluation scope—Clearly documenting what has been included or not
within the scope of the evaluation
• Foundation for a continuous process
– RA.9 Next steps—The activity of documenting next steps and assigning
ownership for their progression
– RA.3 Catalogue of practices—As above
• Forward-looking view
– RA.10 Focus on risk—Examining interrelationships amongst assets, threats to
assets and vulnerabilities, and their effect on the organisation’s business
objectives
• Focus on the critical few
– RA.8 Evaluation scope—As above
– RA.11 Focussed activities—Ensuring that evaluation activities focus on critical
assets for efficient use of resources
• Integrated management
– RA.12 Organisational and technological issues—Ensuring that technology is
considered alongside existing practices used by staff
– RA.13 Business and information technology participation—Ensuring
participation from all areas of the business and from all levels (senior
management to junior staff)
– RA.14 Senior management participation—Active sponsorship, involvement in
and review of the output of evaluations
• Open communication
– RA.15 Collaborative approach—Using workshops or other interactive
approaches to ensure interdisciplinary knowledge and skills
• Global perspective
– RA.12 Organisational and technological issues—As above
– RA.13 Business and information technology participation—As above
124
OCTAVE Criteria Version 2.0 Networked Systems Survivability Program
Importance
Because security has both organizational and technological components, it is
important that an evaluation surface both organizational and technological
issues. The analysis team analyzes both types of issues in relation to the
mission and business objectives of the organization when creating the
organization’s protection strategy and risk mitigation plans. By doing this, the
team is able to address security by creating a global picture of the information
security risks with which the organization must deal.
The criteria also describe the various outputs required from each of the three
phases:
• RO1.1 Critical assets
• RO1.2 Security requirements for critical assets
• RO1.3 Threats to critical assets
• RO1.4 Current security practices
• RO1.5 Current organisation vulnerabilities
• RO2.1 Key components
• RO2.2 Technology vulnerabilities
• RO3.1 Risks to critical assets
• RO3.2 Risk measures
• RO3.3 Protection strategy
• RO3.4 Risk mitigation plans
Importance
Creating a protection strategy is important because it charts a course for
organizational improvement with respect to information security activities.
OCTAVE Method
Included within this 18-volume set of documentation is an introduction on how to
use the method and guidelines on how to prepare for an OCTAVE assessment,
including selection of the team. Volumes 3 to 12 contain all of the information for
the three phases and eight processes of the method, including detailed processes,
worksheets, slides for presentations with notes and examples results.
125
Information Security Harmonisation—Classification of Global Guidance
You should use the slides provided to explain the concepts and activities of this
workshop to the participants as you conduct the workshop.
The process guidelines for Process 1 are written primarily for the lead
facilitator of the workshop. All guidance for the scribe is specifically noted in
these guidelines. Other members of the analysis team will support the lead
facilitator, observe all activities, and take general notes. Regardless of
workshop roles, all members of the analysis team should read and understand
these guidelines.
The volumes also include a number of appendices, which include flow diagrams
and more examples. Volume 15: Appendix, the OCTAVE Catalogue of Practices (48
pages), provides a good range of practices defined as either strategic or operational
that organisations can use when creating their own practices. These practices
include:
• Strategic practices
– SP1 Security awareness and training
– SP2 Security strategy
– SP3 Security management
– SP4 Security policies and regulations
– SP5 Collaborative security management
– SP6 Contingency planning/disaster recovery
• Operational practices
– OP1.1 Physical security plans and procedures
– OP1.2 Physical access control
– OP1.3 Monitoring and auditing physical security
– OP2.1 System and network management
– OP2.2 System administration tools
– OP2.3 Monitoring and auditing IT security
– OP2.4 Authentication and authorisation
– OP2.4 Vulnerability management
– OP2.6 Encryption
– OP2.7 Security architecture and design
– OP3.1 Incident management
– OP3.2 General staff practices
126
OCTAVE Criteria Version 2.0 Networked Systems Survivability Program
The catalogue of practices also contains a survey that can be used to obtain a view
on the existing security posture, along with suggestions on where the various
security statements could apply.
Reference
www.cert.org/octave
127
Information Security Harmonisation—Classification of Global Guidance
128
Guidelines for the Security of Information Systems and
Networks and Associated Implementation Plan
Document Taxonomy
Guidelines for the Security of Information Systems and Networks: Towards a
Culture of Security provides a set of nine principles aimed at fostering a “culture of
security”. The associated Implementation Plan describes the responsibilities of
government, business and civil society in implementing the guidelines.
Circulation
Although OECD is internationally known to those working in government
economic departments and corporate finance and law, its profile within the
information security industry remains low.
129
Information Security Harmonisation—Classification of Global Guidance
Target Audience
The guidelines are aimed at senior persons within organisations responsible for
governance, ethics (corporate social responsibility) and development of IT systems.
Timeliness
The guidelines are high-level and have been reviewed at least twice since first
issued to ensure that they reflect changes in world economics, technology and
events.
Certification Opportunities
Unlike conventions, the guidelines are nonbinding and governments are not legally
bound to their use. However, a number of governments have produced publicly
available plans on how they are implementing the principles. No certification is
available.
Completeness
The guidelines are intended to be high-level and in this context are complete in the
coverage they provide relating to information security principles. They are broad-
based enough to relate to any type of organisation, of any size or geographic
location. No security or technical knowledge is assumed or required. However,
these guidelines would need to be heavily complemented with other publications for
an information security manager as they do not begin to cover the full range of
issues that must be addressed for enterprisewide information security management.
130
Guidelines for the Security of Information Systems and
Networks and Associated Implementation Plan
Availability
The guidelines are publicly available as a complimentary download at
www.oecd.org.
Recognition/Reputation
The results of the 2004 global survey of CISMs (described in this document’s
Introduction) revealed that recognition is very low, with the highest in Oceania at
just slightly more than 60 percent and Central/South America the lowest at 32
percent. The guidelines are felt to have very low acceptance across all regions, with
almost 50 percent giving them no acceptance at all.
Usage
The guidelines are actively used (i.e., implemented, used as best practice or used for
assessment) by only 8 percent or fewer of surveyed CISMs. Bearing in mind that
the principles within the guidelines are used in other security-related publications
(e.g., NIST), it is likely that many CISMs are applying the principles but with
different wording, or they are just not aware of them as OECD principles. There are
mixed opinions on the level of comprehensiveness and effectiveness, both positive
and negative.
Risk Management, 1
Risk assessment is one of the nine principles, but it is not addressed in a
comprehensive manner.
131
Information Security Harmonisation—Classification of Global Guidance
Response Management, 1
One of the principles deals with response management, but not in a comprehensive
manner.
Overall, 1
The document does not provide much in the way of guidance for the information
security manager, although knowledge of the OECD and its nine security principles
is highly recommended as they are referenced in many other information security
standards and guides.
The guidelines provide nine principles that are designed to be complementary and
are aimed at promoting a culture of security. Each principle is briefly explained.
Perhaps uniquely, the principles include ethics and democracy. And, unusually, the
risk assessment principle identifies the need to consider risks to others as well as to
oneself. The guidelines should be of particular interest to an organisation with a
business ethics or corporate social responsibility function.
132
Guidelines for the Security of Information Systems and
Networks and Associated Implementation Plan
technology, physical and human factors, policies and third-party services with
security implications. Risk assessment will allow determination of the
acceptable level of risk and assist the selection of appropriate controls to
manage the risk of potential harm to information systems and networks in light
of the nature and importance of the information to be protected. Because of the
growing interconnectivity of information systems, risk assessment should
include consideration of the potential harm that may originate from others or
be caused to others.
The Implementation Plan for the Guidelines for the Security of Information Systems
and Networks is a brief document of six pages. The majority of the document is
aimed at defining the roles and responsibility of government in promoting a culture
of security, but there are a couple of references to business and civil societies.
Reference
www.oecd.org
133
Information Security Harmonisation—Classification of Global Guidance
134
Manager’s Guide to Information Security
Document Taxonomy
Manager’s Guide to Information Security, issued in July 2002, provides general
guidance on acquiring secure IT products and systems.
Circulation
The Open Group is internationally recognised. However, no information is available
on circulation of the booklet.
Target Audience
The booklet is aimed primarily at business managers responsible for some aspect of
IT systems or those who evaluate or approve information security purchases.
135
Information Security Harmonisation—Classification of Global Guidance
Timeliness
The booklet was published in 2002 as a simple guide to business managers. It is
nontechnical and remains valid in its content.
Certification Opportunities
No certification exists.
Completeness
As this is not directed at the information security manager, it does not begin to cover
the full range of issues that must be addressed for enterprisewide information
security management. However, it does provide some simple explanations of, and
arguments for, security that information security managers may find useful when
discussing information security with business managers.
Availability
This booklet is available for purchase from the Open Group at www.opengroup.org
for US $9.95.
Risk Management, 0
Risk management is not addressed.
136
Manager’s Guide to Information Security
Response Management, 0
Response management is not addressed.
Overall, 1
This publication is designed for business managers; It is not aimed at information
security managers. However, it may be of some use in educating business managers
with purchasing power for IT products and services.
The booklet makes clear that it is the business manager who responsible for
identifying and valuing the risks significant to the business. Technical risks
evaluation is up to trained security practitioners. It also talks about IT security as a
service to the organisation, helping it to run more effectively. The need for activity
logging and detection and response processes is briefly addressed as is the need for
security awareness and training. This naturally leads to explanations on the reality
of how much security is already present in IT systems and whether or not it is
properly enabled to meet the organisation’s acceptance of risks.
The booklet describes the types of things to expect from security solutions, and in
each case, this is provided in a simple and easy-to-understand manner. Included are:
137
Information Security Harmonisation—Classification of Global Guidance
Finally, the booklet addresses what to do next by explaining the options of handling
security in-house or outsourcing.
Reference
www.opengroup.org
138
Annex—CISM Job Domains
Tasks
• Develop the information security strategy in support of business strategy and
direction.
• Obtain senior management commitment and support for information security
throughout the enterprise.
• Ensure that definitions of roles and responsibilities throughout the enterprise
include information security governance activities.
• Establish reporting and communication channels that support information
security governance activities.
• Identify current and potential legal and regulatory issues affecting information
security and assess their impact on the enterprise.
• Establish and maintain information security policies that support business goals
and objectives.
• Ensure the development of procedures and guidelines that support information
security policies.
• Develop business case and enterprise value analysis that support information
security programme investments.
Knowledge Statements
• Knowledge of information security concepts
• Knowledge of the relationship between information security and business
operations
• Knowledge of techniques used to secure senior management commitment and
support of information security management
• Knowledge of methods of integrating information security governance into the
overall enterprise governance framework
• Knowledge of practices associated with an overall policy directive that captures
senior management level direction and expectations for information security in
laying the foundation for information security management within an organisation
• Knowledge of an information security steering group function
• Knowledge of information security management roles, responsibilities and
organisational structure
• Knowledge of areas of governance (for example, risk management, data
classification management, network security, system access)
139
Information Security Harmonisation—Classification of Global Guidance
Risk Management
Identify and manage information security risks to achieve business objectives.
Tasks
• Develop a systematic, analytical and continuous risk management process.
• Ensure that risk identification, analysis and mitigation activities are integrated into
life cycle processes.
• Apply risk identification and analysis methods.
• Define strategies and prioritise options to mitigate risk to levels acceptable to the
enterprise.
• Report significant changes in risk to appropriate levels of management on a
periodic and event-driven basis.
140
Annex—CISM Job Domains
Knowledge Statements
• Knowledge of information resources used in support of business processes
• Knowledge of information resource valuation methodologies
• Knowledge of information classification
• Knowledge of the principles of development of baselines and their relationship to
risk-based assessments of control requirements
• Knowledge of life cycle-based risk management principles and practices
• Knowledge of threats, vulnerabilities and exposures associated with
confidentiality, integrity and availability of information resources
• Knowledge of quantitative and qualitative methods used to determine sensitivity
and criticality of information resources and the impact of adverse events
• Knowledge of use of gap analysis to assess generally accepted standards of good
practice for information security management against current state
• Knowledge of recovery time objectives (RTO) for information resources and how
to determine RTO
• Knowledge of RTO and how it relates to business continuity and contingency
planning objectives and processes
• Knowledge of risk mitigation strategies used in defining security requirements for
information resources supporting business applications
• Knowledge of cost-benefit analysis techniques in assessing options for mitigating
risks, threats and exposures to acceptable levels
• Knowledge of managing and reporting status of identified risks
Tasks
• Create and maintain plans to implement the information security governance
framework.
• Develop information security baseline(s).
• Develop procedures and guidelines to ensure that business processes address
information security risk.
• Develop procedures and guidelines for IT infrastructure activities to ensure
compliance with information security policies.
• Integrate information security programme requirements into the organisation’s life
cycle activities.
• Develop methods of meeting information security policy requirements that
recognise the impact on end users.
• Promote accountability by business process owners and other stakeholders in
managing information security risks.
• Establish metrics to manage the information security governance framework.
• Ensure that internal and external resources for information security are identified,
appropriated and managed.
141
Information Security Harmonisation—Classification of Global Guidance
Knowledge Statements
• Knowledge of methods to develop an implementation plan that meets security
requirements identified in risk analyses
• Knowledge of project management methods and techniques
• Knowledge of the components of an information security governance framework
for integrating security principles, practices, management and awareness into all
aspects and all levels of the enterprise
• Knowledge of security baselines and configuration management in the design and
management of business applications and the infrastructure
• Knowledge of information security architectures (for example, single sign-on,
rules-based as opposed to list-based system access control for systems, limited
points of systems administration)
• Knowledge of information security technologies (for example, cryptographic
techniques and digital signatures, to enable management to select appropriate
controls)
• Knowledge of security procedures and guidelines for business processes and
infrastructure activities
• Knowledge of the systems development life cycle methodologies (for example,
traditional SDLC, prototyping)
• Knowledge of planning, conducting, reporting and follow-up of security testing
• Knowledge of certifying and accrediting the compliance of business applications
and infrastructure to the enterprise’s information security governance framework
• Knowledge of types, benefits and costs of physical, administrative and technical
controls
• Knowledge of planning, designing, developing, testing and implementing
information security requirements into an enterprise’s business processes
• Knowledge of security metrics design, development and implementation
• Knowledge of acquisition management methods and techniques (for example,
evaluation of vendor service level agreements, preparation of contracts)
Tasks
• Ensure that the rules of use for information systems comply with the enterprise’s
information security policies.
• Ensure that the administrative procedures for information systems comply with
the enterprise’s information security policies.
• Ensure that services provided by other enterprises, including outsourced
providers, are consistent with established information security policies.
• Use metrics to measure, monitor and report on the effectiveness and efficiency of
information security controls and compliance with information security policies.
142
Annex—CISM Job Domains
Knowledge Statements
• Knowledge of how to interpret information security policies into operational use
• Knowledge of information security administration process and procedures
• Knowledge of methods for managing the implementation of the enterprise’s
information security programme through third parties, including trading partners
and security services providers
• Knowledge of continuous monitoring of security activities in the enterprise’s
infrastructure and business applications
• Knowledge of methods used to manage success/failure in information security
investments through data collection and periodic review of key performance
indicators
• Knowledge of change and configuration management activities
• Knowledge of information security management due diligence activities and
reviews of the infrastructure
• Knowledge of liaison activities with internal/external assurance providers
performing information security reviews
• Knowledge of due diligence activities, reviews and related standards for managing
and controlling access to information resources
• Knowledge of external vulnerability reporting sources, which provide information
that may require changes to the information security in applications and
infrastructure
• Knowledge of events affecting security baselines that may require risk
reassessments and changes to information security requirements in security plans,
test plans and reperformance
• Knowledge of information security problem management practices
• Knowledge of information security manager facilitative roles as change agents,
educators and consultants
• Knowledge of the ways in which culture and cultural differences affect the
behaviour of staff
• Knowledge of the activities that can change the culture and behaviour of staff
• Knowledge of methods and techniques for security awareness training and
education
143
Information Security Harmonisation—Classification of Global Guidance
Response Management
Develop and manage a capability to respond to and recover from disruptive and
destructive information security events.
Tasks
• Develop and implement processes for detecting, identifying and analysing
security-related events.
• Develop response and recovery plans, including organising, training and
equipping the teams.
• Ensure periodic testing of the response and recovery plans where appropriate.
• Ensure the execution of response and recovery plans as required.
• Establish procedures for documenting an event as a basis for subsequent action,
including forensics when necessary.
• Manage post-event reviews to identify causes and corrective actions.
Knowledge Statements
• Knowledge of the components of an incident response capability
• Knowledge of information security emergency management practices (for
example, production change control activities, development of computer
emergency response team)
• Knowledge of disaster recovery planning and business recovery processes
• Knowledge of disaster recovery testing for infrastructure and critical business
applications
• Knowledge of escalation processes for effective security management
• Knowledge of intrusion detection policies and processes
• Knowledge of help desk processes for identifying security incidents reported by
users and distinguishing them from other issues dealt with by the help desks
• Knowledge of the notification process in managing security incidents and
recovery (for example, automated notice and recovery mechanisms, in response to
virus alerts in a real-time fashion)
• Knowledge of the requirements for collecting and presenting evidence, rules for
evidence, admissibility of evidence, quality and completeness of evidence
• Knowledge of post-incident reviews and follow-up procedures
144
ITGI Publications
Other Publications
All publications come with detailed assessment questionnaires and work
programmes. For further information, please visit www.isaca.org/bookstore or
e-mail [email protected].
Control Practices
Control Practices extends the capabilities of the COBIT framework with an
additional level of detail. The COBIT IT processes, business requirements and
control objectives define what needs to be done to implement an effective control
structure. The control practices provide the more detailed how and why needed by
management, service providers, end users and control professionals, to help them
justify and design the specific controls needed to address IT project and operational
risks and improve IT performance by providing guidance on why controls are
needed, and what the best practices are for meeting specific control objectives. All
of the control practices are individually integrated into COBIT Online. This
publication, which contains control practices for all of the 34 high-level COBIT
control objectives, is available in the ISACA Bookstore. 2004
145
Information Security Harmonisation—Classification of Global Guidance
146
ITGI Publications
Other Titles
Oracle® Database Security, Audit and Control Features (2004)
OS/390—z/OS: Security, Control and Audit Features (2003)
IT Governance Implementation Guide (2003)
COBIT Quickstart (2003)
Risks of Customer Relationship Management: A Security, Control and Audit
Approach (2003)
Security Provisioning: Managing Access in Extended Enterprises (2002)
Electronic and Digital Signatures: A Global Status Report (2002)
Virtual Private Network—New Issues for Network Security (2001)
COBIT 3rd Edition® (2000)
Control Objectives for Net Centric Technology (CONCT©) (1999)
Digital Signatures—Security and Controls (1999)
ERP Series:
Security, Audit and Control Features PeopleSoft®: A Technical and Risk
Management Reference Guide (2004)
Security, Audit and Control Features Oracle® Applications: A Technical and Risk
Management Reference Guide (2003)
Security, Audit and Control Features SAP®R/3®: A Technical and Risk
Management Reference Guide (2002)
E-commerce Security Series:
Securing the Network Perimeter (2002)
Business Continuity Planning (2002)
Trading Partner Authentication, Registration and Enrollment (2000)
Public Key Infrastructure (2001)
A Global Status Report (2000)
Enterprise Best Practices (2000)
147
Information Security Harmonisation—Classification of Global Guidance
Future Publications
This research publication will provide the steps needed to implement an awareness
effort and how to build concurrence of other departments, and provides baselines,
maturity levels and control objectives. A security awareness self-assessment
programme and a case study will be included.
148
ITGI Publications
Information Security Governance: Top Actions for Security Managers furthers that
research by taking the list of questions and creating specific actions for information
security managers and CISOs. It will address:
• Uncovering the information security issues in an enterprise from a business and
management perspective
• Dealing with management’s perception of information security and security risk
management issues
• Positioning information security as a component of IT and business governance
• Establishing what is required to ensure that information security governance is
successfully implemented within the enterprise
149
Information Security Harmonisation—Classification of Global Guidance
150
ITGI Publications
151