Introduction To Standards & Frameworks: Presentation Title
Introduction To Standards & Frameworks: Presentation Title
Role Improve the business processes ISO 9000, Six Sigma Regulatory Imposition/Governance SoX, Basel II, COSO IT focused discipline ISO 27001, CMM, ITIL, ISO 20000, CobiT Governance and continuity ISO 38500 and BS25999 Commonality Many are certifiable May require multiple certifications Significant overlap with each other Differences Focus areas and objectives The processes and applicable procedures
Page 1
Presentation title
Most Quality Management Systems and frameworks, by their very nature, overlap with each other. However, there is no straight comparison between standards, frameworks and best practices. They serve different purposes and are not mutually exclusive. The most common overlaps are in the areas of quality management, training, audit documentation and conformance.
Page 2
Presentation title
ISO/IEC 27001:2005
Published by ISO and IEC, ISO/IEC 27001 is an international standard for ISMS Provides information to responsible parties for implementing information security Basis for developing security standards, and management practices within an organization to improve reliability on information security Through the process of regular risk assessment & continuous improvement, it lays down the roadmap to identify, assess, mitigate and monitor the IS risks. Selection of adequate security controls that protect information assets and give confidence to interested stakeholders.
Page 3
Presentation title
COBIT
Control Objectives for Information and related Technology (COBIT) is a set of best practices (framework) for IT governance, providing management tools such as metrics and maturity models. It also provides greater focus on alignment of business and IT goals, and greater clarity on IT delivering value, performance management, governance, ownership and assurance requirements. It includes 34 high-level control objectives grouped under the domains of
Planning and Organization Acquisition and Implementation Delivery and Support, and
Page 4
Presentation title
ISO/IEC 38500:2008
The ISO/IEC 38500:2008, Corporate governance of information technology standard, provides a framework for effective governance of IT to assist those at the highest level of organizations to understand and fulfill their legal, regulatory, and ethical obligations in respect of their organizations use of IT. ISO/IEC 38500 is applicable to organizations from all sizes, including public and private companies, government entities, and not-for-profit organizations. This standard provides guiding principles for directors of organizations on the effective, efficient, and acceptable use of Information Technology (IT) within their organizations. The framework comprises definitions, principles and a model. It sets out six principles for good corporate governance of IT:
Page 5
Presentation title
Developed by the Office of Government Commerce (OGC) in the UK Is a set of concepts and policies for managing the Information Technology (IT) services (ITSM), developments and operations. Used by organizations world-wide as a comprehensive and consistent source of good practice to establish and improve capabilities in Service Management. ITIL gives a detailed description of a number of important IT practices with comprehensive checklists, tasks and procedures that any IT organization can tailor to its needs.
The Technology
Application management
Page 6
Presentation title
ITIL v3
Framework of best practice guidance for ITSM Addresses particular "point of pain" Addresses issues such as services, quality, organization, and policy and process management Key changes from ITIL v2 to ITIL v3
Service Design
ITIL
Service Operation Service Transition
Page 7
Presentation title
ISO/IEC 20000
Published by ISO and IEC in December 2005, ISO/IEC 20000 is the first international standard for IT Service Management Based on, and supersede the earlier British Standard, BS 15000 Enables the organizations to benchmark their capability in delivering managed services, measuring service levels and assessing performance Issued under 2 parts
Control processes
Configuration Management Change Management
Resolution processes
Incident management Problem management
Relationship processes
Business relationship management Supplier management
Page 8
Presentation title
BS 25999
British standard for business continuity management (BCM), has been developed to help minimize the risk of disruptions. It establishes the process, principles and terminology of BCM. It provides a basis for understanding, developing and implementing business continuity within the organization. BS 25999 is suitable for any organization, large or small, from any sector. The BS 25999 comprises of two parts:
BS 25999-1:2006 - Code of Practice for BCM (provides BCM best practice recommendations) BS 25999-2:2006 - A Specification for BCM (provides the requirements for a BCMS based on BCM best practice)
Page 9
Presentation title
ISO 9000
ISO 9000 lays down what requirements an organization's quality system must meet. Effective, December 15, 2000, the ISO 9000 standards were revised as follows:
ISO 9000:2000, Quality management systems - Fundamentals and vocabulary ISO 9001:2000, Quality management systems - Requirements Revised to include concepts from the former ISO 9001, 9002, and 9003 standards. ISO 9004:2000, Quality management systems - Guidelines for performance improvements.
Environment
Quality Management System Audit and Certification Self Declaration and External Audit Quality Management System ISO 9000 is a family of standards that addresses quality management systems within an organization
Positioning
Page 10
Presentation title
CMM
The Capability Maturity Model (CMM) is a methodology used to develop and refine an organization's software development process. The model describes a five-level evolutionary path of increasingly organized and systematically more mature processes. The Capability Maturity Model involves the following aspects:
Maturity Levels: A 5-Level process maturity continuum - where the uppermost (5th) level is a notional ideal state where processes would be systematically managed by a combination of process optimization and continuous process improvement. Key Process Areas: A Key Process Area (KPA) identifies a cluster of related activities that, when performed collectively, achieve a set of goals considered important. Goals: The goals of a key process area summarize the states that must exist for that key process area to have been implemented in an effective and lasting way. The goals signify the scope, boundaries, and intent of each key process area. Common Features: Common features include practices that implement and institutionalize a key process area. There are five types of common features: Commitment to Perform, Ability to Perform, Activities Performed, Measurement and Analysis, and Verifying Implementation. Key Practices: The key practices describe the elements of infrastructure and practice that contribute most effectively to the implementation and institutionalization of the KPAs.
Page 11
Presentation title
Six sigma
Six Sigma is a process of quality measurement, which helps the organization in the improvement of their quality. Six Sigma seeks to improve the quality of process outputs by identifying and removing the causes of defects (errors) and minimizing variability in manufacturing and business processes. Six Sigma doctrine asserts that:
Continuous efforts to achieve stable and predictable process results (i.e. reduce process variation) are of vital importance to business success. Manufacturing and business processes have characteristics that can be measured, analyzed, improved and controlled. Achieving sustained quality improvement requires commitment from the entire organization, particularly from top-level management.
Page 12
Presentation title
Page 13
Presentation title
Page 14
Presentation title
Clause 4
4 Information security management system
4.2.1 Establish the ISMS 4.2.2 Implement and operate the ISMS 4.2.3 Monitor and review the ISMS 4.2.4 Maintain and improve the ISMS 4.3.1 General 4.3.2 Control of documents 4.3.3 Control of records
Page 15
Presentation title
Clause 5
5 Management responsibility
Page 16
Presentation title
Clause 6
6 Internal ISMS audits
Page 17
Presentation title
Clause 7
7 Management review of the ISMS
Page 18
Presentation title
Clause 8
8 ISMS improvement
Page 19
Presentation title
Security Policy
Objective:
Covers:
Page 20
Presentation title
Covers:
Management commitment to information security Information security coordination Allocation of information security responsibilities Authorization process for information processing facilities Confidentiality agreements Contact with authorities Contact with special interest groups Independent review of information security Identification of risks related to external parties Addressing security when dealing with customers Addressing Security in third party agreements
Presentation title
Page 21
Asset Management
Objective: Responsibility for assets Information classification
Covers: Inventory of assets Ownership of assets Acceptable use of assets Classification guidelines Information labelling and handling
Page 22 Presentation title
Covers:
Roles and responsibilities Screening Terms and conditions of employment Management responsibilities Information security awareness, education and training Disciplinary process Termination responsibilities Return of assets Removal of access rights
Page 23
Presentation title
Covers:
Physical Security Perimeter Physical entry Controls Securing Offices, rooms and facilities Protecting against external and environmental threats Working in Secure Areas Public access delivery and loading areas Cabling Security Equipment Maintenance Securing of equipment off-premises Secure disposal or re-use of equipment Removal of property
Page 24
Presentation title
Operational Procedures and responsibilities Third party service delivery management System planning and acceptance Protection against malicious and mobile code Backup Network Security Management Media handling Exchange of Information Electronic Commerce Services Monitoring
Covers:
Page 25
Presentation title
Separation of development, test and operational facilities Service delivery Monitoring and review of third party services Managing changes to third party services Capacity Management System acceptance Controls against malicious code Controls against mobile code Information backup Network Controls Security of network services Management of removable media Disposal of Media Information handling procedures Security of system documentation Information exchange policies and procedures Exchange agreements
Page 26
Presentation title
Access Control
Objective:
Business Requirement for Access Control User Access Management User Responsibilities Network Access Control Operating system access control Application and Information Access Control Mobile Computing and tele-working
Covers:
Access Control Policy User Registration Privilege Management User Password Management Review of user access rights Password use
Presentation title
Page 28
Access Control
Unattended user equipment Clear desk and clear screen policy Policy on use of network services User authentication for external connections Equipment identification in networks Remote diagnostic and configuration port protection Segregation in networks Network connection control Network routing control Secure log-on procedures User identification and authentication Password management system Use of system utilities Session time-out Limitation of connection time Information access restriction Sensitive system isolation Mobile computing and communications Teleworking
Page 29
Presentation title
Security requirements of information systems Correct processing in applications Cryptographic controls Security of system files Security in development and support processes Technical Vulnerability Management
Covers:
Security requirements analysis and specification Input data validation Control of internal processing Message integrity Output data validation Policy on use of cryptographic controls Key management Control of operational software Protection of system test data
Presentation title
Page 30
Access Control to program source code Change control procedures Technical review of applications after operating system changes Restriction on changes to software packages Information leakage Outsourced software development Control of technical vulnerabilities
Page 31
Presentation title
Covers:
Reporting information security events Reporting security weaknesses Responsibilities and procedures Learning from information security incidents Collection of evidence
Presentation title
Page 32
Covers:
Including information security in the business continuity management process Business continuity and risk assessment Developing and implementing continuity plans including information security Business continuity planning framework Testing, maintaining title and re-assessing business continuity Page 33 Presentation plans
Compliance
Objective
Compliance with legal requirements Compliance with security policies and standards, and technical compliance Information Systems audit considerations
Covers:
Identification of applicable legislation Intellectual property rights (IPR) Protection of organizational records Data protection and privacy of personal information Prevention of misuse of information processing facilities Regulation of cryptographic controls Compliance with security policies and standards Technical compliance checking Information systems audit controls Protection of information system audit tools
Page 34
Presentation title
Implementation of an ISMS
Define the scope and boundaries, security policy Define the risk assessment approach Identify the risks
Assets/Threats/Vulnerabilities/Impacts
Analyze and evaluate the risks Identify and evaluate options for the treatment of risks Select control objectives and controls for the treatment of risks Obtain management approval of the proposed residual risks Obtain management authorization to implement and operate the ISMS Prepare a Statement of Applicability Formulate and implement the risk treatment plan
Page 35
Presentation title
Implementation of an ISMS
Implement controls to meet the control objectives Measure the effectiveness of the selected controls or groups of controls Implement training and awareness Manage operations and resources Implement sub-policies or procedures Monitor and review the ISMS
Effectiveness of the ISMS controls Risk Assessments Internal ISMS audits and management review Corrective and preventive actions Ensure improvements achieve their intended objectives
Page 36
Presentation title
Structure of ISMS
Electronic Stand alone Intranet Manual Paper Consider how to control Distribution Updates Authorization
Page 37
Presentation title
Page 38
Presentation title
Internal ISMS audits Competent auditors (internal/external) Audit process and reporting Management Review Regular Basis Scope remains adequate Improvements in ISMS process are identified
Page 39 Presentation title
Page 40
Presentation title
Page 41
Presentation title
Generally conducted on site Examines the ISMS framework for compliance with ISO 27001:2005 Looks at policy, scope, risk management, selection of controls and statement of applicability Auditors will probably not look in depth at specific procedures, but will expect adequate sign-posting to standards, procedures and work instructions
Follow up non-conformities from Stage 1 Documentation Audit Verify implementation and operation of ISMS
The Assessment Team Leader makes a recommendation but not make final decision for certification confirmed by office.
Page 42 Presentation title
Certification
A certificate will be issued for ISO 27001 certification The certificate is valid for a period of three years, excepting suspension, withdrawal or cancellation. The certificate carries wording relating to scope and reference to the Statement of Applicability (SOA) available at the time of assessment
Continuing surveillance audit
Carries out a surveillance audit generally twice per year Aims to cover the scope of certification over a three year cycle Intermediate audits (i.e. Special Visits) may be carried
At the end of this period the certification body can extend the certificate for a new period of three years on condition of a positive re-assessment
Page 43 Presentation title
Implementation challenges
Mindset about Information security as Information technology security Implementation of security controls across departments other than IT Security awareness training Adopting the right methodology for risk assessment Investment decisions/ budget constraints Resistance in terms of added documentation Implementation delays due to work overload, cost deduction and lack of top management involvement Identification of CISO, where the company has a small or medium size IT team Independence of CISO from IT team Exception process Managing existing contracts and agreements Change in scope of certification Resignations / change at the top management
Page 44
Presentation title