Information Security in The Function of Corporate Management of Information Technologies
Information Security in The Function of Corporate Management of Information Technologies
Information Security in The Function of Corporate Management of Information Technologies
net/publication/375188674
CITATIONS READS
0 75
4 authors, including:
Aleksandar Gacina
University of Banja Luka
1 PUBLICATION 0 CITATIONS
SEE PROFILE
All content following this page was uploaded by Tihomir Latinovic on 02 November 2023.
ABSTRACT
It is known that the three basic elements of information security are protection against
confidentiality, integrity and availability of information. The ISO/IEC 27001 standard helps
companies protect information in any form. The new version of the ISO/IEC 27001:2022 standard
follows new trends in IT and introduces new security controls. Information security is not the same
in 2022 as it was in 2013, as many companies have embraced remote work and are using virtual
applications. The standards of the ISO/IEC 27000 series represent answers to the increasing
challenges of implementing information security measures in the company. The paper researched,
analyzed and proposed the conceptual framework of information security in the function of
corporate management of information resources, services and business values. The goal is to show
that there is a strong connection between information security and company operations.
The recommendations and guidelines of the COBIT 2019 management framework were used
for information technology management. An important feature of the development and application
of the COBIT framework is its flexibility and alignment with many relevant standards.
Keywords: international standard 27000 series, COBIT, corporate management of
information technologies.
INTRODUCTION
In the contemporary business environment, all processes must have access to high-quality and
secure information and data. Information security is a part of our reality, our work, and our life.
System information security includes natural persons and environment, processes, organization and
technology ( l., 2019). Protecting everyday activities that involve critical data,
information, and intellectual property from cyber threats is a significant challenge in modern
society. To adequately safeguard an information system, it is necessary to align, implement, and
monitor all necessary security measures. For these reasons, there is a need for effective information
security management, leading to the development of standards and best practice guidelines that
provide recommendations for establishing effective protection of information resources.
The international standard ISO 27001 represents a contemporary framework for assessing
information security and implementing an Information Security Management System (ISMS) for
companies of all sizes, structures, or orientations. An essential characteristic of this standard is risk
management and risk assessment. Risk assessment is one of the most critical steps in the
implementacion of ISMS, not only because of the result of risk assessment is the basis for planning
and conducting the necessary controls but also because of the procedure and methodology of
conducting the assessment. (Sikman et al., 2022). Risks that compromise the three fundamental
security requirements - confidentiality, integrity, and availability - necessitate the use of security
controls. Such risks must be identified, and effective management of these risks is essential.
The process of managing security risks can rightfully be considered the foundation of
building a secure and reliable computer infrastructure. Identifying critical information resources
and determining their associated security risks is a process that enables more effective and cost-
efficient decision-making related to enhancing security ( beni glasnik BiH, 2022).
Legal regulations, existing standards, and "best practice" rules prescribe the same
recommendations for behavior and information security management system controls across all
institutions. Such recommendations are theoretically universal and applicable to a large part of
institutions. However, in practice, these requirements are specific to companies within their
business operations. There is a lack of connection between financial investments in an information
security management system and the quantitative representation of costs, which makes it difficult
for information security managers to present economic indicators of information security
investments to the institution's management ( ).
During the research on the exposed problem, most authors analyzed information security
policy based on knowledge management ( ). Some authors focused on the identification
and assessment of operational risk management related to Information and Communication
Technologies (ICT) based on the ISO/IEC 27001:2013 standard, applying a fuzzy logic (Pichit, &
Chuleekorn, 2018). Simultaneously, a lack of a specific, general model within institutions tailored
to their needs and size is observed, aiming to assess the functionality of the Information Security
Management System according to the ISO 27001:2022 standard, within the scope of corporate IT
governance.
Changed structure of the standard: The new structure of the standard is divided into four
thematic categories instead of the previous fourteen. The standard now consists of the following
categories: organizational controls (37 controls), people controls (8 controls), physical controls (14
controls), and technical controls (34 controls). The reduction in the number of categories aims to
simplify the implementation of ISMS and provide better clarity in the process of implementation.
The advantages of the new version of the standard can be defined as follows:
Enhanced risk management: The new version of the ISO/IEC 2700:2022 standard provides
improved guidelines for identifying, assessing, and managing information security risks. This
enables organizations to better understand their risks and address them more effectively to reduce
the likelihood of unwanted incidents.
Simpler and improved structural approach to the standard and presentation of controls: The
change in the structure of the standard into four thematic categories makes it easier for
organizations to comprehend and implement controls. This simplification aids in the efficient
implementation of the Information Security Management System.
Expanded focus on cybersecurity and privacy: The addition of "cybersecurity and privacy
protection" in the title of the standard reflects a broader coverage of information security,
considering new challenges brought by the digital age, including cyber threats and data protection.
Assisting companies in reassessing their risks and threats and implementing security controls:
The introduction of new security controls in line with technological advancements and cyber
threats enables companies to better assess their specific risks and tailor protective measures to stay
ahead of potential threats.
All these advantages contribute to strengthening information security and empower
organizations to better manage their information resources in today's complex and dynamic
environment.
Figure 1. Standard ISO/IEC 27001 - sectors with the largest number of certificates in the world in 2021 (ISO
Survey, 2021).
Figure 2. ISO/IEC 27001 standard - certificate number in BiH for the period from 2016 to 2021.
Figure 3 shows the number of companies in Bosnia and Herzegovina and neighboring
countries that implemented the ISO/IEC 27001 standard in 2021 (ISO Committee, 2021).
Figure 3. ISO/IEC 27001 standard - number of certificates in BiH and neighboring countries for 2021.
order to ensure a high-quality information system to achieve business objectives, potential risks
and threats that the company may not have immediately identified need to be identified. Therefore,
an audit of the information system is conducted, both by internal and independent external
auditors. The goal of auditing the information systems is to verify the alignment of business
objectives and information system objectives. The audit aims to determine the extent to which the
functioning of the information system aligns with the company's business objectives. The object of
the audit of information systems is to assess the maturity of IT controls that are part of the
information system and are interconnected to achieve the goals of the entire information system.
There are several methodologies for auditing information systems, with COBIT and ISO 27001
being two of them, used to methodologically assess the quality of the information system.
The following are explanations of individual stages of COBIT process maturity assessment:
Level 0 - Non-existent processes:
There is no corporate governance of information technology. The company lacks a
responsible person or IT governance center. IT investments are made only when problems arise,
and there is no risk assessment.
Level 1 - Initial stage:
The company management has not yet recognized the significance of IT governance, and
there are no formal procedures. The importance of IT risks is not recognized. IT governance is
conducted within the IT center, and top management is not familiar with these activities.
Level 2 - Repeatable processes:
IT governance exists, but procedures are not coordinated between the IT center or other
operational organizational units. There is no supervision, coordination, or standardized procedures.
Responsibility lies with individuals, and there is no employee training.
Level 3 - Defined processes:
Employees are familiar with and trained in procedures, and there is IT governance. However,
these procedures are not tailored to the company's operations. Responsibility for implementing
procedures lies with individuals, and there is no system supervision, making it unlikely to detect
deviations from defined processes.
Level 4 - Managed and measured processes:
Procedures and policies for IT governance exist, and it is possible to supervise these
procedures, measure their success, and correct any identified shortcomings. Responsibilities of
appropriate corporate bodies are defined. Companies continuously improve processes and activities
and set adequate IT governance objectives aligned with business goals. Modern methods are used
to measure the achievement of these objectives.
Level 5 - Optimized processes:
IT corporate governance processes are at a high level. The efficiency and effectiveness of IT
are continuously measured, and results are compared with other companies and best practices. The
involvement of IT in strategic plans is recognized. All IT activities are predefined according to
business priorities.
The fundamental elements were created for the formation of the functional framework for
information security and IT governance in the company at all levels of COBIT process
development and operation. The basic elements of the model for each level correspond to security
controls according to the recommendations of ISO 27001:2022 standard. When creating the
functional framework, care was taken to ensure that each corresponding element corresponds to the
complexity levels of COBIT processes. Tables 1 to 6 represent the functional framework for
information security and IT governance according to the levels of COBIT process development.
CONCLUSIONS
Many companies employ various forms of information technology in their business
operations, which exposes them to numerous threats and new risks. To ensure the quality of their
information systems, identify potential risks, and achieve successful operations, periodic audits and
evaluations of information systems are increasingly being conducted.
The process of evaluating the success and maturity of information systems is performed
periodically. Standards and governance frameworks are used for auditing and assessing
information systems, ensuring secure and high-quality business operations. The combination of
information security standard ISO 27001:2022 and the COBIT governance framework for
corporate IT management greatly assists in the information systems evaluation process. This paper
presents levels of information security and IT management maturity, with each level incorporating
fundamental procedures from both standards. It is demonstrated that a strong connection exists
between information security and company performance.
LITERATURE
Aleksi Poslovna informatika, Univerzitet u Banjoj Luci, Ekonomski fakultet.
ISO Committee. (2021). ISO/CASCO Ducument. Retrived July 14, 2023, from
https://www.iso.org/committee/
ISO Survey. (2021), The ISO Survay. Retrived July 14, 2023, from https://www.iso.org/the-iso-
survey.html
(2014). Metoda modeliranja politike informacijske sigurnosti temeljena na upravljanju
znanjem. Doktorski rad rebu, Fakultet elek
Zagreb, Republika Hrvatska.
Pichit, B. & Chuleekorn, N. (2018). Fuzzy rule-based risk management under ISO/IEC 27001:2013
standard for information security. Retrived March 23, 2023, from http://jcst.rsu.ac.th
beni glasnik BiH. (2022). Smjernice za izradu metodologije za procjenu rizika. Preuzeto
12.07.2023. sa http://www.mkt.gov.ba/Content/OpenAttachment?id=c12bbdf5-87b0-4adb-
b4a9-20ec8a997c5e&lang=bs
Digitalna transformacija poslovanja. Zagreb, Ekonomski fakultet.
Sikman, Lj., Latinovic, T., & Sarajlic, N. (2022). Modelling of Fuzzy Expert System for on
Security Management System UIS (University Information System). Technical Gazette,
29(1), 60-65.
(2021). Modelovanje sistema za upravljaje sigur informacija u okviru visokog
obrazovanja. Doktorski rad. Univerzitet u Tuzli, Fakultet elektrotehnike, Tuzla, BiH.
j alj, D. (2019). ISO 27001 Information systems security,
development, trends, technical and challenges. International Journal of Engineering, XVII(4),
45-48.