Unit-4 Cs
Unit-4 Cs
Benefits of ISMS
ISMS provides a holistic approach to managing the information systems within an organization.
This offers numerous benefits, some of which are highlighted below.
Protects sensitive data. An ISMS protects all types of proprietary information assets
whether they're paper-based, preserved digitally or reside in the cloud. These assets can
include personal data, intellectual property, financial data, customer data and data
entrusted to companies through third parties.
Meets regulatory compliance. ISMS helps organizations meet all regulatory
compliance and contractual requirements and provides a better grasp on legalities
surrounding information systems. Since violation of legal regulations comes with hefty
fines, having an ISMS can be especially beneficial for highly regulated industries with
critical infrastructures, such as finance or healthcare.
Provides business continuity. When organizations invest in an ISMS, they automatically
increase their level of defense against threats. This reduces the number of security
incidents, such as cyber attacks, resulting in fewer disruptions and less downtime, which
are important factors for maintaining business continuity.
Reduces costs. An ISMS offers a thorough risk assessment of all assets. This enables
organizations to prioritize the highest risk assets to prevent indiscriminate spending on
unneeded defenses and provide a focused approach toward securing them. This structured
approach, along with less downtime due to a reduction in security incidents, significantly
cuts an organization's total spending.
Enhances company culture. An ISMS provides an all-inclusive approach for security
and asset management throughout the organization that isn't limited to IT security. This
encourages all employees to understand the risks tied to information assets and adopt
security best practices as part of their daily routines.
Adapts to emerging threats. Security threats are constantly evolving. An ISMS helps
organizations prepare and adapt to newer threats and the continuously changing demands
of the security landscape.
Implementing ISMS
There are various ways to set up an ISMS. Most organizations either follow a plan-do-check-
act process or study the ISO 27001 international security standard which effectively details the
requirements for an ISMS.
The following steps illustrate how an ISMS should be implemented:
1. Define the scope and objectives. Determine which assets need protection and the
reasons behind protecting them. Consider the preference of what the clients, stakeholders
and trustees want to be protected. Company management should also define clear-cut
objectives for the areas of application and limitations of the ISMS.
2. Identify assets. Identify the assets that are going to be protected. This can be achieved by
creating an inventory of business-critical assets including hardware, software, services,
information, databases and physical locations by using a business process map.
3. Recognize the risks. Once the assets are identified, their risk factors should be analyzed
and scored by assessing the legal requirements or compliance guidelines. Organizations
should also weigh the effects of the identified risks. For example, they could question the
amount of impact it would create if the confidentiality, availability or integrity of
information assets is breached, or the probability of that breach's occurrence. The end
goal should be to arrive at a conclusion outlining which risks are acceptable and which
must be tackled at all costs due to the potential amount of harm involved.
4. Identify mitigation measures. An effective ISMS not only identifies risk factors but also
provides satisfactory measures to effectively mitigate and combat them. The mitigation
measures should lay out a clear treatment plan to avoid the risk altogether. For example, a
company trying to avoid the risk of losing a laptop with sensitive customer data should
prevent that data from being stored on that laptop in the first place. An effective
mitigation measure would be to set up a policy or rule that doesn't permit employees to
store customer data on their laptops.
5. Make improvements. All the previous measures should be monitored, audited and
checked repeatedly for effectiveness. If the monitoring reveals any deficiencies or new
risk management factors, then restart the ISMS process from scratch. This enables the
ISMS to rapidly adapt to changing conditions and offers an effective approach to
mitigating the information security risks for an organization.
4.1.2 Risk management and assessment
What is risk assessment?
Risk assessment refers to the evaluation of all the potential risks associated with a certain activity
or your organization’s way of doing business. It includes different types of risks such as
operational risks, project-related risks, process-related risks, and much more.
Security policies are never one-size-fits-all. Since each organization has its own risk appetite and
unique security requirements, It becomes necessary that you understand how to create a policy
that fits your security requirements.
Here are the 7- steps to help you create your next security policy:
1. Identify the need for having a particular policy. Does it align with your security
objectives and goals? Who does it affect? What would happen in the absence of this
policy?
2. Get approval from the management and stakeholders to develop a security policy.
3. Perform a risk analysis to identify vulnerabilities in your IT environment. And then
prioritize risks based on their potential consequences.
4. Create a comprehensive first draft security policy and get feedback from legal, IT, HR,
and other stakeholders. Once the feedback is in, make necessary changes and finalize the
policy.
5. Train your employees, and ensure that they understand the scope, purpose, and
consequences related to the policy.
6. Publish the security policy and inform stakeholders, customers, contractors, and everyone
who has access to the resources of your organization. Work with your web team to
publish public policies on your website.
7. Regularly review and update your policy to meet evolving security requirements, also
monitor the efficiency and compliance of the security policy by performing timely
vulnerability and penetration testing. Ensure compliance through internal audits and
maintain a good security posture.
Harm to Privacy
Harm to privacy refers to an individual’s privacy becoming compromised. Negative
consequences include unauthorized access, identity theft, reputational damage and distress. A
cybersecurity professional’s decisions ultimately impact privacy protection. They can safeguard
privacy in several ways, including implementing security measures, tools and practices; calling
out designs and apps that mislead users into sharing excessive information; ensuring compliance
with security frameworks; and mitigating risks.
Harm to Property
Harm to property refers to damage to both physical and digital assets. It can lead to unauthorized
access and the disruption of services. For a cybersecurity professional, prioritizing network
security becomes an ethical matter. They have a responsibility to implement countermeasures,
which can include risk assessments, firewalls and continuous monitoring. Failure to do so can
lead to property harm caused by a cyber attack.
Cybersecurity Resource Allocation
Determining what to invest in cybersecurity activities can be a challenge. Large companies can
invest more resources to enhance their cyber defenses, improving their chances of detecting
anomalies or intrusions. More important, knowing how to allocate resources is essential.
Cybersecurity professionals must properly use resources for the greater good of the organization
and its stakeholders. Deploying a patch for a critical software vulnerability may be costly and
time consuming, but not doing so may risk a data breach that impacts millions of customers.
Transparency and Disclosure
Companies should promptly reveal critical vulnerabilities in their software upon learning about
them. This level of transparency can not only help cybersecurity professionals collaborate and
share information to respond quickly to attacks but also allow customers whose data is
threatened to take appropriate action to diminish their own risks.
Approaches to transparency and disclosure depend on the organization. However, the recent
Consolidated Appropriations Act of 2022 offers guidance: Section 2242 notes that companies
should voluntarily disclose a known cyber attack within 72 hours after its discovery.
Reputation Damage
Unethical behavior can erode trust and tarnish the reputation of individuals,
organizations, and even entire industries. A loss of reputation can lead to decreased
customer trust, investor confidence, and business opportunities, which creates ethical
issues for all parties involved.
Compromised Privacy
Poor cyber security practices can infringe on individual privacy rights by allowing
unauthorized access to sensitive information and other critical data. This can lead to
identity theft, stalking, and other forms of privacy violation, severely damaging
individuals’ personal and professional life.
Legal Consequences
Unethical misconduct can lead to legal action and regulatory penalties. In recent years,
jurisdictions have introduced an increasing number of laws and regulations that mandate
specific cyber security and data protection standards. Organizations that fail to meet these
requirements may be subject to legal consequences.