ch02 CYB104
ch02 CYB104
Governance and
Compliance
Chapter 2
1
Learning Outcomes
1. Establish and/or maintain an information security
governance framework.
2. Integrate information security governance into corporate
governance.
3. Establish and maintain information security policies to
guide the development of standards, procedures, and
guidelines.
4. Develop business cases to support investments in
information security.
5. Establish, communicate, and maintain organizational
information security policies, standards, guidelines,
procedures, and other documentation.
6. Identify legal, regulatory, organizational, and other
applicable compliance requirements.
2
This Chapter Cover:
• Governance
• Policy Documents
• Complying with Laws and Regulations
3
Governance
5
Developing Business Cases
Scope statement – the proposed initiative
Strategic context
Cost analysis
Evaluation of alternatives
Project plan
Management plan
6
• Master service agreements (MSA)
• umbrella contract
• Service-level agreements (SLAs)
• conditions of service
Third Party • Memorandum of understanding (MOU)
• informal mechanism to avoid future
Relationships misunderstandings.
• Business partnership agreements (BPAs)
• two organizations agree to do business
• Nondisclosure agreements (NDAs)
• protect the confidentiality of information
7
Understanding Policy Documents
8
Policies
9
Centers for
Medicare &
Medicaid
Services (CMS)
Roles and
Responsibilities
Chart
10
Standards
Standards provide
mandatory requirements
describing how an
organization will carry out
its information security
policies
11
Procedures
Procedures are detailed, step-by-step processes that
individuals and organizations must follow in specific
circumstances
• Monitoring procedures
• how the organization will perform security monitoring
activities
• Evidence production procedures
• how the organization will respond to court orders, and
other legitimate requests
• Patching procedures
• frequency and process of applying patches
12
Guidelines
13
• Mechanism for exceptions to rules
• Compensating controls
• mitigate the risk associated with exceptions
to security standards
Exceptions
• find alternative means to achieve an
and Compensating objective when the organization cannot meet
Controls the original control requirement
• address a temporary exception to a security
requirement
14
Developing Policies
15
Complying with Laws and Regulations
16
Adopting Standard Frameworks
17
Control Objectives for Information
Technology (COBIT)
• Six principles for a governance system:
• Satisfy stakeholder needs and generate value
• Enterprise information and technology is built from many components that
work together
• Dynamic
• Distinguish between governance and management activities and structures
• Tailored to the enterprise’s needs
• Cover the enterprise end-to-end
18
COBIT IT Governance
• Three principles for IT governance
• Based upon a conceptual model
• Open and Flexible
• Align to relevant major related standards, frameworks, and regulations
• Five domains
• Evaluate, Direct, and Monitor (EDM)
• Align, Plan, and Organize (APO)
• Build, Acquire, and Implement (BAI)
• Deliver, Service, and Support (DSS)
• Monitor, Evaluate, and Assess (MEA)
19
• Cybersecurity Framework (CSF) designed to assist
organizations attempting to meet one or more of
the following five objectives:
NIST • Describe their current cybersecurity posture
Cybersecurity • Describe their target state for cybersecurity
• Identify and prioritize opportunities for
Framework improvement
• Assess progress toward the target state
• Communicate among internal and external
stakeholders about cybersecurity risk
• Framework Core
• Framework Implementation
• Framework Profiles
https://www.givainc.com/blog/index.cfm/2019/7/24/5-key-changes-made-to-the-nist-cybersecurity-framework-v11 21
Asset
Management
Cybersecurity
Framework
22
NIST
Cybersecurity
Framework
Implementation
23
NIST Risk
Management
Framework
24
International Organization for Standardization
(ISO) Standards
ISO publishes a series of standards that offer best practices for cybersecurity and privacy
ISO 27002: describes the actual controls that an organization may implement to meet cybersecurity objectives
ISO 27004: helps organizations implement a consistent process for monitoring, measurement, analysis, and evaluation
25
Benchmarks
and Secure
Configuration
Guides
Center for Internet Security (CIS):
an organization that benchmarks
for commonly used platforms
26
Security Control Verification and Quality Control
27
Summary
28
Reference
CISM Certified Information
Security Manager Study Guide
by Mike Chapple
29