Sudarsan Jayaraman  - Open information security management maturity model
Upcoming SlideShare
Loading in...5
×
 

Sudarsan Jayaraman - Open information security management maturity model

on

  • 1,553 views

 

Statistics

Views

Total Views
1,553
Views on SlideShare
1,553
Embed Views
0

Actions

Likes
1
Downloads
81
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Maturity levels are design so more important (ROSI wise) processes are in level 1 and so on. This makes easier to prioritize and schedule investment. ISO9001 management principles can be applied to security, as process have defined outputs that can be acted on. Levels 1-3 can be certified the same way ISO9001 management systems are. Level 4 can be certified ISO9001 wise or ISO27001 if ISO27001 requirements are met. Level 5 requires ISM3 Consortium involvement, as metrics are not compulsory for ISO27001. Frequently strict requirements for critical production systems spill all over IT, making management and use of information needlessly more difficult and expensive to use. The environment concept links lifecycles

Sudarsan Jayaraman  - Open information security management maturity model Sudarsan Jayaraman - Open information security management maturity model Presentation Transcript

  • Open Information Security Management Maturity Model An Overview 25th May, 2011 Presented by : Sudarsan Jayaraman, CISA, CISM, ITIL –V3 Expert, ISO 20000 (C), ISO 27001 LA, COBIT (F) Director – Technology Risk Services
  • Today’s Discussion Points
    • Current Information Security Management Practices
    • Open Information Security Management Maturity Model (O-ISM3) – An Overview
    • Implementation Approach and Potential Benefits?
  • Do you agree ? QUESTION: Does Information Security Compliance Projects improve the security posture of an organization?
  • Do you agree ? ANSWER: NO , Information Security Compliance Projects are not helping the organization and it is more of documentation of controls rather than security implementation. QUESTION: Does Information Security Compliance Projects improve the security posture of an organization?
  • Organization Concerns
    • Management Concerns
    • Inadequate view of Information security functioning
    • Increase in number security incidents
    • High cost of Information security and low ROI
    • IT staffing issues
    • Lack of knowledge of critical systems
    • Information Security not measurable
    • CISO’s Concerns
    • No clear view on business requirements
    • Budget cuts and less IT spending
    • Deliver projects to meet business growth
    • Compliance requirements from various agencies
    • Demonstrate value to business
    • Improve security and privacy controls
    • Improving quality of Information security delivery
  • Governance – A Balancing act
    • Governance is about:
      • Performance
        • Improving profitability, efficiency, effectiveness, and growth
      • Conformance
        • Adhering to legislation, internal policies, and audit requirements
    Conformance Performance
  • What is Information Security Governance?
  • International Standards in Information Security
    • ISO/IEC 27001 Series Information Technology – Security Techniques - Information Security Management System Requirements
    • O – ISM3 –Open Group Information Security Management Maturity Model
    • Standard of Good Practice for Information Security from Information Security Forum
  • Common issues in the current standard Metrics allow finding incidents and faults in the process, enabling continuous improvement. Yes No Metrics Incident: Breach of a security objective Incident: Breach of CIA
    • Security Objectives
    • Attacks prevention
    • Errors prevention
    • Accidents prevention
    Attacks prevention Information Quality should focus on addressing business interests
    • Information qualities:
    • Business
    • Compliance
    • Technical
    • Information qualities:
    • Confidentiality
    • Availability
    • Integrity
    Link between business goals and information security Focus on business objectives/goals and derive security objectives and targets from business requirement Top - Down Bottom-up Business approach Process based management is easier to integrate with Cobit, ISO 9001 and ITIL Controls don’t have defined output, but processes do. This means processes can be managed using metrics of the outputs. Process Based Controls Based Paradigm Implications Requirements Current ISMS Criteria
  • IT Standards and Framework IT Governance COBIT ISO 27000/ Open ISM3/ ISF series ITIL Business Requirements WHAT HOW VAL IT IT Service Management ISO/IEC 20000 ISO/IEC38500 Project Management PMI - PMBOK
  • Characteristics of a Framework Has General Acceptability Among Organizations Helps Meet Regulatory Requirements Control Framework Defines a Common Language Provides Sharper Business Focus Ensures Process Orientation
  • O-ISM3 – Information Security Management Maturity Model
    • O-ISM3 main characteristics are:
      • Business-focused
      • Process-oriented
      • Measurement-driven
    O-ISM3 Framework Characteristics
  • About Open ISM3
    • ISM3 was developed by ISM3 consortium and it is developed by team headed by Mr. Vicente Aceituno
    • The ISM3 is now adopted by Open Group and the latest version is released on Feb 2011
    • The Open Group is a vendor- and technology-neutral consortium.
    • Other standards - The Open Group Architecture Framework ( TOGAF® )
  • Highlights of O-ISM3
    • Enable the creation of ISM systems that are fully aligned with the business mission and compliance needs.
    • Applicable to any organization regardless of size, context and resources.
    • Enable organizations to prioritize and optimize their investment in information security.
    • Enable continuous improvement of ISM systems using metrics
  • ISM3 Process
    • GP-1 Knowledge Management
    • GP-2 ISM and Business Audit
    • Implementing O-ISM3
    • GP-3 ISM Design and Evolution
    Generic Practices Strategic Practices
    • SSP-1 Report to Stakeholders
    • SSP-2 Coordination
    • SSP-4 Define Division of Duties rules
    • SSP-6 Allocate Resources for Information Security
    Tactical Practices
    • TSP-1 Report to Strategic Management
    • TSP-2 Manage Allocated Resources
    • TSP-3 Define Security Targets and Security Objectives
    • TSP-4 Service Level Management
    • TSP-6 Security Architecture
    • TSP-7 Background Checks
    • TSP-8 Personnel Security
    • TSP-9 Security Personnel Training
    • TSP-10 Disciplinary Process
    • TSP-11 Security Awareness
    • TSP-13 Insurance Management
    • TSP-14 Information Operations
  • ISM3 Process - Operational Practices
    • OSP-1 Report to Tactical Management
    • OSP-2 Security Procurement
    • Lifecycle Control
    • OSP-3 Inventory Management
    • OSP-4 Information Systems IT Managed Domain Change Control
    • OSP-5 IT Managed Domain Patching
    • OSP-6 IT Managed Domain Clearing
    • OSP-7 IT Managed Domain Hardening
    • OSP-8 Software Development Life-cycle Control
    • OSP-9 Security Measures Change Control
    • OSP-16 Segmentation and Filtering Management
    • OSP-17 Malware Protection Management
    Operational Practices
    • Access and Environmental Control
    • OSP-11 Access control
    • OSP-12 User Registration
    • OSP-14 Physical Environment Protection Management
    • Availability Control
    • OSP-10 Backup Management
    • OSP-15 Operations Continuity Management
    • OSP-26 Enhanced Reliability and Availability Management
    • OSP-27 Archiving Management
    • OSP-16 Segmentation and Filtering Management
    • Testing and Auditing
    • OSP-19 Internal Technical Audit
    • OSP-20 Incident Emulation
    • OSP-21 Information Quality and Compliance Assessment
    • Monitoring
    • OSP-22 Alerts Monitoring
    • OSP-23 Internal Events Detection and Analysis
    • OSP-28 External Events Detection and Analysis
    • Incident Handling
    • OSP-24 Handling of incidents and near-incidents
    • OSP-25 Forensics
  • Sample Process Description….. Project Quant Related methodologies OSP-4: Information Systems IT Managed Domain Change Control OSP-9: Security Measures Change Control Related processes Supervisor: TSP-14 Process Owner Process Owner: Information Systems Management Responsibilities
    • Update level, calculated as follows:
    • The update level for a specific information system is equal to the sum of the days outstanding for all pending security patches.
    • The IT managed domain update level is equal to the sum of the individual update levels, divided by the number of information systems.
    • The lower this metric, the better. This metric allows checking of the progress of the patching process,
    • and comparison of the update level of different IT managed domains.
    Quality Up-to-date services in every IT managed domain Services Update Level Report (OSP-4) Metrics Report (TSP-4) Outputs Inventory of Assets (OSP-3) Inputs OSP-051: Services update level report template OSP-052: Services Patching Management procedure Documentation Patching prevents incidents arising from the exploitation of known weaknesses in services. Value This process covers the ongoing update of services to prevent incidents related to known weaknesses, enhancing the reliability of the updated systems. Description OSP-5:IT Managed Domain Patching Process
  • O-ISM3 Goals Prevent and mitigate Incidents ,Optimise the use of information, money, people, time and infrastructure. Generic Goals Defines Security Objectives consistent with organizational objectives, protecting stakeholders Interests. Strategic Goals Provide feedback to Strategic Management; Manage budget, people and other resources allocated to information security Tactical Goals Provide feedback to Tactical Management, Carry out processes for incident prevention, Detection, And mitigation. Operational Goals
  • O – ISM3 An Information Security Management Maturity Model
    • O-ISM3 is a framework for managing information security in the context of business objectives.
    • Business objectives and security objectives are aligned, information security becomes a key contributor to the common goal of achieving the business objectives.
    • Security objectives and security targets are expressed in tangible, specific, and measurable terms.
    Business Objectives Security Objectives Security Targets
  • O-ISM3 Security Management Levels
    • Strategic Management : Managers involved in the long-term alignment of IT with business needs
    • Tactical Management : Managers involved in the allocation of resources and the configuration and management of the ISMS.
    • Operational Management : Managers involved in setting up, operating, and monitoring specific processes.
    Strategic Managers Tactical Managers Operational Managers Stakeholders Report Report Report
  • Significant Features of O-ISM3
    • The significant features of O-ISM3 are:
    • Metrics for Information Security
    • Capability Levels
    • Maturity Levels
    • Process based
    • Adopts best practices
    • Accreditation.
  • O-ISM3 – Capability Levels
    • Capability is a property of how a process is managed
    • Process capability is determined by the metrics the process produces.
    * * * * * * * Documentation * * * * * * Activity Metric Type * * * * * * Scope * * * * * * Effectiveness * * * * * * Unavailability * * * * * Load * * Quality * Efficiency Planning Benefits realization Optimization Optimized Assessment Controlled Monitor Managed Test Defined Audit, Certify Initial Management practices Enabled Capability Level
  • O-ISM3 Implementation Operational Business Objectives (Objectives, Security Targets) Dependency Analysis Operationalized Security Objectives (Objectives, Security Targets) Priority (Objectives, Security Targets) Durability (Objectives, Security Targets) Quality (Objectives, Security Targets) Access Control (Objectives, Security Targets) Technical (Objectives, Security Targets) OSP -15, OSP-26, Others OSP -6, OSP-10, OSP-27, Others OSP-21, Others OSP -3, OSP-11,OSP-12, OSP-14, Others OSP -5, OSP-7,OSP-16, OSP-17, Others Business Objectives and Incidents Security Objectives and Incidents ISM3 Processes and Metrics
  • Typical Implementation Approach Open – ISM3 Implementation Approach
  • Potential Benefits
    • Maturity Levels make easier to prioritize and optimize investment in information security.
    • It scales to small and big organizations. The use of separate process in every environment prevents using procedures for restrictive environments all over the organization.
    • Business Focused
    • Process Orientation
    • Manageable (with Metrics)
    • Compatible (ITIL, ISO27001, ISO9001, Cobit)
    • Adaptable
    • Flexible
    • Open Standard, readily available
    • Q & A ???
    • Thank you for your participation
  •