CISM Chapter 1-Information Security Governance
CISM Chapter 1-Information Security Governance
1
2
3
4
5
What is CISM?
• The Certified Information Security Manager
(CISM) certification is a unique management-
focused certification that has been earned by
more than 24,267 professionals since its
introduction in 2002. Unlike other security
certifications, CISM is for the individual who
manages, designs, oversees and assesses an
enterprise's information security.
6
The number of current CISMs
CISA
More than 115,000 professionals have earned the CISA certification since it was
established in 1978. The number of current CISAs by region is:
• Asia: 21,730
• Central/South America: 2,440
• Europe/Africa: 18,880
• North America: 33,640
• Oceania: 1,950
CISM
More than 27,000 professionals have earned the CISM certification since its
introduction in 2002. The number of current CISMs by region is:
• Asia: 3,740
• Central/South America: 1,040
• Europe/Africa: 6,920
• North America: 10,730
• Oceania: 790
7
The number of current CISMs
CGEIT
More than 6,000 professionals have earned the CGEIT certification since its inception
in 2007. The number of current CGEITs by region is:
• Asia: 920
• South/Central America: 320
• Europe/Africa: 1,580
• North America: 2,450
• Oceania: 180
CRISC
More than 18,000 professionals have earned the CRISC certification since it was
established in 2010. The number of current CRISCs by region is:
• Asia: 2,050
• Central/South America: 990
• Europe/Africa: 3,950
• North America: 8,790
8
• Oceania: 450
CISM VS CISSP?
9
CISM VS CISSP?
12
Chapter 1—Information Security Governance
13
1.1 Information Security Governance Overview
15
1.1 Information Security Governance Overview
16
1.1 Information Security Governance Overview
Enterprise/Corporate Governance and Information Security Governance:
Enterprise/Corporate Governance:
is the set of responsibilities and practices exercised by the board and
executive management with the goal of providing strategic direction,
ensuring that objectives are achieved, ascertaining that risk is managed
appropriately and verifying that the organization’s resources are used
responsibly.
17
1.1 Information Security Governance Overview
Ultimately, senior management and the board of directors are accountable
for information security governance to ensure information security
governance is an integral part of enterprise governance.
18
1.1 Information Security Governance Overview
The information security governance framework will generally consist of:
1. A comprehensive security strategy intrinsically linked with business
objectives.
2. Governing security policies that address each aspect of strategy, controls
and regulation.
3. A complete set of standards for each policy to ensure that procedures
and guidelines comply with policy.
4. An effective security organizational structure void of conflicts of interest
with sufficient authority and adequate resources.
5. Institutionalized metrics and monitoring processes to ensure
compliance, provide feedback on effectiveness and provide the basis for
appropriate management decisions.
19
20
1.2 Importance of Information Security Governance
The dependence of organizations on their information and the systems that
handle it, coupled with the risk, benefits and opportunities that these
resources present, have made information security governance a critical
aspect of overall governance.
21
1.2 Importance of Information Security Governance
22
1.3 Outcomes of Information Security Governance
The objective of information security governance is to develop, implement
and manage a security program that achieves the following 6 basic
outcomes:
23
Effective Information Security Governance
24
1.4 Effective Information Security Governance
The following set of principles help guide implementation of effective
information security governance:
25
1.4 Effective Information Security Governance
Organizations should treat information security as an integral part of the
system life cycle.
Organizations should provide information security awareness, training
and education to personnel.
Organizations should conduct periodic testing and evaluation of the
effectiveness of information security policies and procedures.
Organizations should create and execute a plan for remedial action to
address any information security deficiencies.
Organizations should develop and implement incident response
procedures.
Organizations should establish plans, procedures and tests to provide
continuity of operations.
Organizations should use security good practices guidance, such as
ISO/IEC 27002, to measure information security performance.
26
1.5 Roles and Responsibilities of Senior Management
Board of Directors/Senior Management
Effective information security governance can be accomplished only by
senior management involvement in approving policy, and appropriate
monitoring and metrics coupled with reporting and trend analysis.
27
1.5 Roles and Responsibilities of Senior Management
A common concern for boards of directors is liability. Most organizations,
to protect themselves from shareholder lawsuits, provide specific insurance
to create a level of protection for the board in exercising its governance
responsibilities.
28
1.5 Roles and Responsibilities of Senior Management
Executive Management
Executive management team is responsible for ensuring that needed
organizational functions, resources and infrastructure are available and
properly utilized to fulfill the information security activities.
29
1.5 Roles and Responsibilities of Senior Management
Steering Committee
Many organizations use a steering committee comprised of senior
representatives who are impacted by security considerations.
30
1.5 Roles and Responsibilities of Senior Management
CISO
Increasingly, prudent management is elevating the position of the
information security officer to a C-level or executive position, as
organizations begin to understand their dependence on information and the
growing threats to it.
Ensuring the position exists, coupled with the responsibility, authority and
required resources, demonstrates management and board of director
awareness and commitment to sound information security governance.
These responsibilities currently range from the CISO or vice president for
security reporting to the CEO, to system administrators who have part-time
responsibility for security management who might report to the IT manager
or CIO. It may also be the CIO, chief information security officer (CISO), chief
financial officer (CFO) or, in some cases, the chief executive officer (CEO).
31
1.6 Information Security Roles and Responsibilities
Obtaining senior management commitment
Without senior management support and an effective information security
governance structure, it is difficult for the information security manager to
know what goals to steer the program toward, to determine optimal
governance processes.
32
1.6 Information Security Roles and Responsibilities
Adequate resources and sufficient authority to implement and maintain
security activities.
Treating information security as a critical business issue and creating a
security-positive environment.
Demonstrating to third parties that the organization deals with
information security in a professional manner.
Providing high-level oversight and control.
Periodically reviewing information security effectiveness.
Setting an example by adhering to the organization’s security policies
and practices.
34
1.6 Information Security Roles and Responsibilities
Establishing reporting and communication channels
35
1.6 Information Security Roles and Responsibilities
3. Other Management
Line managers, supervisors and department heads charged with various
security and risk management-related functions, including ensuring
adequate security requirement awareness and policy compliance, must
be informed of their responsibilities.
4. Employees
Timely training and education programs.
Centralized on-board training program for new hires.
Organizational education material on updated strategies and policies.
Personnel instructed to access the intranet or e-mail-based notifications
for periodic reminders or ad hoc adaptations.
Support senior management and business process owners by assigning
an information security governance coordinator within each functional
unit to obtain accurate feedback of daily practices in a timely manner.
36
1.6 Information Security Roles and Responsibilities
37
GRC
38
1.7 Governance, Risk Management and Compliance (GRC)
GRC is a term that reflects an approach that organizations can adopt in
order to integrate Governance, risk management and compliance areas.
39
1.7 Governance, Risk Management and Compliance (GRC)
40
1.8 Business Model for Information Security
The Business Model for Information Security (BMIS) takes a business-
oriented approach to managing information security.
41
1.8 Business Model for Information Security
The elements and dynamic interconnections that form the basis of the
model establish the boundaries of an information security program and
model how the program functions and reacts to internal and external
change.
42
1.9 Assurance Process Integration - Convergence
Assurance activities are often fragmented and segmented in silos with
different reporting structures.
Evaluating business processes from start to finish (along with their controls),
regardless of which particular assurance process is involved, can mitigate
the tendency for security gaps to exist among various assurance functions.
43
1.10 Governance and Third Party Relationships
Third parties include:
Service providers.
Outsourced operations.
Trading partners.
Merged or acquired organizations.
44
1.10 Governance and Third Party Relationships
From information security governance perspective, there should be rules
and processes employed when dealing with third-party relationships. Such
as:
1. The responsibility of the Information security manager to address the
potential risk and impacts of 3rd party relationships should be clear and
documented.
45
Information Security Governance Metrics
46
1.11 Information Security Governance Metrics
Metrics: is a term used to denote measurements based on one or more
references and involves at least two points (the measurement and the
reference).
47
1.11 Information Security Governance Metrics
Effective security metrics
The fundamental purpose of metrics, measurements and monitoring is
“decision making”.
49
1.11 Information Security Governance Metrics
Measuring information security governance and management:
Measuring information security governance and management with any
precision may be more difficult than measuring security.
50
1.11 Information Security Governance Metrics
52
1.11 Information Security Governance Metrics
53
1.11 Information Security Governance Metrics
1. Governance implementation metrics
Key goal indicators (KGI) and key performance indicators (KPI) can be used to
provide information about the achievement of process or service goals, and
can determine whether organizational milestones and objectives are being
met.
54
1.11 Information Security Governance Metrics
KPI: is a measure that determines how well the process is performing in
enabling the goal to be reached. A KPI is a lead indicator of whether a goal
will likely be reached, and a good indicator of capability, practices and skills.
It measures an activity goal, which is an action that the process owner must
take to achieve effective process performance. “mean time to repair”.
55
1.11 Information Security Governance Metrics
2. Strategic alignment metrics
The cost effectiveness of the security program is tied to how well it supports
the objectives of an organization and at what cost.
The best overall indicator that security activities are in alignment with
business objectives is the development of a security strategy that defines
security objectives in business terms and ensures that the objectives are
directly articulated from planning to implementation of policies, standards,
procedures, processes and technology.
56
1.11 Information Security Governance Metrics
3. Risk management metrics
The key goal of information security is to reduce the adverse impacts on the
organization to an acceptable level. Therefore, a key metric is the adverse
impacts of information security incidents experienced by the organization.
57
1.11 Information Security Governance Metrics
4. Value Delivery metrics
Optimal investment levels occur when strategic goals for security are
achieved and an acceptable risk posture is attained at the lowest possible
cost.
58
1.11 Information Security Governance Metrics
Key indicators (KGIs and KPIs) can include:
The cost of security in relation to the value of assets.
Security resources that are allocated by degree of assessed risk and
potential impact.
Control effectiveness that is determined by periodic testing.
The utilization of controls; controls that are rarely used are not likely to
be cost effective.
The number of controls to achieve acceptable risk and impact levels;
fewer effective controls can be expected to be more cost effective than a
greater number of less effective controls.
59
1.11 Information Security Governance Metrics
5. Resource Management metrics
60
1.11 Information Security Governance Metrics
6. Performance Measurement
61
1.11 Information Security Governance Metrics
6. Assurance Process Integration (Convergence)
62
Information Security Strategy Overview
63
1.12 Information Security Strategy Overview
In The Concept of Corporate Strategy, 2nd Edition, Kenneth Andrews
describes corporate strategy as:
64
1.12 Information Security Strategy Overview
“Business Strategy” provides a road map to achieving the “Business
Objectives.”
It should provide inputs into “Risk Management” plans and the “Information
Security Strategy”, to promote ALIGNMENT OF INFORMATION SECURITY
WITH BUSINESS GOALS.
The objective of the security strategy is the desired state defined by business
and security attributes.
The strategy provides the basis for an action plan comprised of one or more
security programs that, as implemented, achieve the security objectives.
The strategy and action plans must contain provisions for monitoring as well
as defined metrics to determine the level of success.
This provides feedback to the CISO and steering committee to allow for
midcourse correction and ensure that security initiatives are on track to meet
defined objectives. 65
1.13 Developing Information Security Strategy
66
Information Security Strategy Objectives
67
1.14 Information Security Strategy Objectives
The objectives of developing an information security strategy must be
defined. Metrics should be developed to determine if those objectives are
being achieved.
The strategy will need to consider what each of the selected areas will mean
to the organization, how they might be achieved, and what will constitute
success.
68
1.14 Information Security Strategy Objectives
The following should be considered when developing the information
security strategy:
1. The Goal.
2. Defining Objectives.
3. The Desired State. (what you want to be?)
4. Risk Objectives.
69
1.14 Information Security Strategy Objectives
1. The Goal
The first and difficult, question that must be answered by an organization
seeking to develop an information security strategy is—what is the goal?
70
1.14 Information Security Strategy Objectives
One approach commonly used is to create a few rough levels of value—for
example, from 0 (zero-value information) to 5 (critical information).
Information of zero value can then be archived for a specified period, notices
sent to business owners and, if there are no objections, destroyed.
Information deemed a five (critical) then becomes the priority for protection
efforts.
71
1.14 Information Security Strategy Objectives
2. Defining Objectives
Defining long-term objectives in terms of a “desired state” of security is
necessary. Without a well-articulated vision of desired outcomes for a
security program, it will not be possible to develop a meaningful strategy.
Deploying VPNs may provide the sales force with secure remote
connectivity, enabling improved performance.
72
1.14 Information Security Strategy Objectives
3. The Desired State
The “desired state” is a complete snapshot of all relevant conditions at a
particular point in the future, including people, processes and technologies.
73
1.14 Information Security Strategy Objectives
4. Risk Objectives:
A major input into defining the desired state will be the organization’s
approach to risk and its risk appetite.
74
1.14 Information Security Strategy Objectives
The diagram below illustrates the balance of the cost of controls against the
cost of losses, showing the optimal level of control.
75
Determining Current State of Security
76
1.15 Determining Current State of Security
A current state evaluation of information security must also be determined
using the same methodologies or combination of methodologies employed
(such as COBIT, CMM or the balanced scorecard) to determine strategy
objectives, or the desired state.
CURRENT RISK
The current state of risk must also be assessed through a comprehensive risk
assessment.
78
Information Security Strategy Development
79
1.16 Information Security Strategy Development
A good security strategy should address and mitigate risk while complying
with the legal, contractual and regulatory requirements of the business, as
well as provide demonstrable support for the business objectives of the
organization and maximize value to the stakeholders. The security strategy
also needs to address how the organization will embed good security
practices into every business process and area of the business.
To develop a strategy is to move from the current state to the desired state.
Knowing where one is and where one is going provides the essential starting
point for strategy development; it provides the framework for creating a road
map.
80
1.16 Information Security Strategy Development
Achieving the desired state is usually a long-term goal consisting of a series
of projects and initiatives.
81
Information Security Strategy resources and constrains
82
1.17 Strategy Resources
1. Policies and standards:
Policies and standards are considered tools of governance and management,
respectively, and procedures and guidelines the purview of operations.
Policies:
High-level statements of management intent, expectations and direction.
Policies in a mature organization can, for the most part, remain fairly
static.
An example of a policy statement on access control could be:
“Information resources shall be controlled in a manner that effectively
prevents unauthorized access.”
Policies can be considered the “constitution” of security governance and
must be clearly aligned with the strategic security objectives of the
organization.
83
1.17 Strategy Resources
Standards:
Standards in this context are the metrics, allowable boundaries or the
process used to determine whether procedures, processes or systems
meet policy requirements. They are the “law” to the “constitution” of
policy.
They provide the measuring stick for policy compliance and a sound basis
for audits. They govern the creation of procedures and guidelines.
A standard for passwords used for access control could be: Passwords for
medium and low security domains shall be composed of no less than eight
characters consisting of a mixture of upper and lower case letters, and at
least one number and one punctuation mark.
84
1.17 Strategy Resources
Procedures:
Procedures are the responsibility of operations, including security
operations.
Procedures’ terms must be exact. For example, the words “must,” “will”
and “shall” will be used for any task that is mandatory. The word “should”
must be used to mean a preferred action that is not mandatory. The terms
“may” or “can” must only be used to denote a purely optional action.
Procedures for passwords would include the detailed steps required for
setting up password accounts, and for changing or resetting passwords.
85
1.17 Strategy Resources
Guidelines:
Guidelines for executing procedures are also the responsibility of
operations.
86
1.17 Strategy Resources
Technologies:
Technology is one of the cornerstones of an effective security strategy.
Refer to the CISM Review Manual for an illustrative table about how to achieve
effective defences against security incidents, by combining policies, standards
and procedures with technology.
87
1.17 Strategy Resources
Organizational Structure:
During the same period, the percentage reporting directly to the board of
directors has increased from 21% to 32% and 36% now report to the CEO.
88
1.17 Strategy Resources
Awareness and education:
Training, education and awareness are vital in the overall strategy since
security is often weakest at the end-user level.
89
1.17 Strategy Resources
Audits:
Since audits can provide powerful monitoring tools for the information
security manager, it is important to ensure that the security department has
access to audit test results as part of strategy considerations.
90
1.17 Strategy Resources
Compliance enforcement:
Security managers often find that the greatest compliance problems arise
with management. If there is a lack of commitment and compliance in
management ranks, it may be difficult, to enforce compliance across an
organization.
This approach usually also requires that these processes be carefully thought
out, clearly communicated and cooperatively implemented.
91
1.17 Strategy Resources
Threat assessment:
93
1.17 Strategy Resources
Risk assessment and management:
Risk: the combination of the probability of an event and its consequence. Risk
has traditionally been expressed as Threats x Vulnerabilities = Risk.
Risk assessment: a process used to identify and evaluate risk and potential
effects. Risk assessment includes assessing the critical functions necessary
for an organization to continue business operations, defining the controls in
place to reduce organization exposure and evaluating the cost for such
controls. Risk analysis often involves an evaluation of the probabilities of a
particular event.
While both threat and vulnerability assessments can be useful in their own
right, in considering the elements of security strategy, assessing the overall
risk to the organization is also required.
While threats and vulnerabilities that pose no risk to the organization may
not be immediately significant, the ever-changing risk landscape makes it
likely that this will not continue to be the case.
94
1.17 Strategy Resources
Business impact assessment:
Business impact is the “bottom line” of risk. Risk that cannot result in an
appreciable impact is not important.
95
1.18 Strategy Constraints
Legal and regulatory requirements:
There are also a number of legal and regulatory issues associated with
Internet business, global transmissions and trans border data flows (e.g.,
privacy, tax laws and tariffs, data import/export restrictions, restrictions on
cryptography, warranties, copyrights, trade secrets, national security),
resulting in constraints and boundaries on security strategies.
The global organization may need to establish different security strategies for
each regional division, or it can base policy on the most restrictive
requirements in order to be consistent across the enterprise.
96
1.18 Strategy Constraints
Ethics:
Culture:
A strategy that is at odds with cultural norms may encounter resistance, and
this may make successful implementation difficult.
97
1.18 Strategy Constraints
Organizational Structure:
98
1.18 Strategy Constraints
Costs:
99
1.18 Strategy Constraints
Time:
There may be compliance deadlines that must be met, or support for certain
strategic operations such as a merger, must be accommodated.
The level of acceptable risk and the risk tolerance of the organization play a
major role in developing an information security strategy.
One method is to develop recovery time objectives (RTOs) for critical systems.
The shorter the RTO, the greater the cost and the lower the risk tolerance.
100
1.19 Action Plan to Implement Strategy
Implementing an information strategy will typically require one or more
projects or initiatives – action plan or roadmap.
101
1.20 Information Security Program Objectives
The objective of the information security program is to protect the interests
of those relying on information and the processes, systems and
communications that handle, store and deliver the information from harm,
resulting from failures of availability, confidentiality and integrity.
102
103