Callio Secura 17799 White Paper
Callio Secura 17799 White Paper
Callio Secura 17799 White Paper
By Rima Saliba
Information Security Analyst, Callio Technologies
René Saint-Germain,
President, Callio Technologies
Abstract
This white paper presents Callio Secura 17799, a tool that includes everything you need to devel-
op, implement, manage and certify your Information Security Management System (ISMS) based
on the ISO 17799 / BS 7799-2 standard - the only international ISMS standard available today. With
Callio Secura 17799 you apply a practical method of developing, implementing, managing, and
certifying an Information Security Management System. Starting by defining the desired scope of
your organization's ISMS, the process continues with assessing and managing risks, generating
policies, implementing security controls in accordance with the risk analysis, controlling and pub-
lishing your ISMS policies, procedures and documentation, auditing your ISMS, and finally, review-
ing and improving your ISMS.
Pages
1 Introduction
2 ISO 17799 / BS 7799-2 Methodology and Callio Secura 17799 Tools and Modules
3 Callio Secura 17799 Structure
5 Steps for Implementing ISO 17799 / BS 7799-2 with Callio Secura 17799
Information exchange and other relations between businesses, organizations and administrations,
both at national and international levels, create a need for the use of recognized standards in the
management of information security.
Specialists in information security widely view ISO 17799 / BS 7799-2 as the answer to this need. As
a model and reference, it enables an organization to define its own security goals and to develop an
Information Security Management System (ISMS) that is customized to its needs.
The ISO 17799 standard makes recommendations for information security management for use by
those who are responsible for initiating, implementing or maintaining security in their organization. Its
purpose is to provide a common basis for organizational security standards and for effective security
management practice, thereby improving confidence in inter-organizational dealings.
Recommendations from this standard should be selected and used in accordance with applicable
laws and regulations.
Complementary to ISO 17799, the BS 7799-2 standard specifies requirements for establishing, imple-
menting, operating, monitoring, reviewing, documenting, maintaining and improving an ISMS within
the context of an organization's overall business risks. It specifies requirements for implementing
security controls customized to the needs of individual organizations or parts thereof.
Consequently, implementation of the ISO 17799 / BS 7799-2 standard can be carried out in a series
of steps, as touched on in the introduction to ISO 17799 and in the second part of BS 7799. These
steps can be summarized as follows:
To carry out the first three steps, you need to follow a methodology and use a risk-analysis tool. ISO
17799 does not specify requirements for methods of risk analysis, since each organization has its own
particular needs and characteristics.
The bulk of ISO 17799 / BS 7799-2 is devoted to the fourth and fifth steps of the process, telling you
"what to do" but not "how to do it". This is where CALLIO SECURA 17799 comes in, helping organi-
zations define the "how to" of managing information security, and providing tools for the development,
management and certification of their Information Security Management Systems.
The following section presents the features and functionalities of Callio Secura 17799, beginning with
the relation between the methodology of ISO 17799 / BS 7799-2 and the tools in Callio Secura 17799.
Each module and implementation tool is explored, including the risk analysis tool, the policy genera-
tor, the diagnostics for audit and compliance, and the document management tool.
As indicated by the title of this article, Callio Secura 17799 is a tool for implementing the ISO 17799
/ BS 7799-2 standard. As such, it offers virtually everything needed to develop an Information
Security Management System and to manage the documents required by the standard.
The table below shows the relation between the ISO 17799 / BS 7799-2 methodology and the tools
and modules of Callio Secura 17799, which implement the standard in a practical way.
Risk Assessment Diagnose the level of compliance with ISO 17799. Risk assessment module, including
Compile an inventory of, and evaluate, the assets preliminary diagnostic, asset invento-
to protect. Identify and evaluate threats and vulner- ry and evaluation, risk identification
abilities. Calculate the value of associated risks. and evaluation, and risk calculation
Risk Treatment Find out how selecting and implementing the right Control selection
controls can enable an organization to reduce risk Consult selected controls
to an acceptable level. Policy management
Template selection
Training and Employees may be the weakest link in your organi- Methodology
Awareness zation's information security. Learn how to set up Document management tool
an information security awareness program.
Audit Preparation Learn how to validate your management frame- ISMS diagnostic
work and what must be done before bringing in an Statement of applicability
external auditor for BS 7799-2 certification.
Audit Learn more about the steps performed by external Document management tool
auditors and find out about BS 7799-2 accredited
certification bodies.
Documentation Generate all ISMS reports and documentation, Reports module: generate reports
and Reports including the ISMS scope, policies, risk assess- and send them to the document man-
ment report, risk treatment plan, procedures, state- ager for control
ment of applicability, etc.
Control of Approve, review, update and publish ISMS docu- Document management tool
Documentation ments
Control and Learn how to improve the effectiveness of your All Callio Secura 17799 modules as
Continual ISMS in accordance with the management model well as continual improvement tools
recognized by ISO.
Improvement
The following diagram illustrates the structure of Callio Secura 17799. In each module, the user has
access to the input and resources provided by Callio Secura 17799, and by the ISO 17799 / BS
7799-2 standard, in order to work on specific tasks in the implementation process. This gives the
user everything he needs to generate the corresponding reports required for managing the ISMS.
Learn how to get the ISO 17799 implementation project under way. More specifically, learn to:
- Encourage commitment from senior management;
- Choose and train all members of the initial team taking part in the project.
Power Point presentations and implementation diagrams are available in the methodology module.
They will introduce you to the step-by-step approach to ISO 17799 implementation and BS 7799-2
certification.
The methodology guide provides a list of the type of documents to look for, such as:
- Security policy documents;
- Standards and procedures for policies (administrative or technical);
- Risk assessment reports;
- Risk treatment plans;
- Documents indicating the existence of information security controls or that reflect the
ongoing management of the ISMS, such as audit journals, audit trails, computer incident
reports, etc.
These documents should be reviewed by the implementation team, and controlled, revised and
approved by senior management or by security officers. Should the company require a document
management tool, it can use the one provided by Callio Secura 17799.
An organization's value resides in its assets. Assets can take a variety of forms, from the phys-
ical (buildings and equipment), to intellectual or informational (ideas, software and patents), or
even the meta-physical (brand and reputation).
A given asset may present a weakness that makes it susceptible to attack or damage. This is
referred to as an asset's vulnerability.
The statutory and contractual obligations that the organization must comply with, along with its trad-
ing partners, contractors and suppliers, constitute the legal requirements.
Business requirements, on the other hand, are the unique set of principles, objectives and require-
ments for information processing that the organization has developed and implemented in order to
run its business operations and processes. These requirements apply to the organization's informa-
tion systems.
Risk
When a threat exploits an asset's vulnerability, the asset is compromised. This compromise can affect
the confidentiality, integrity or availability of the asset and results in a partial or total loss of value. This
loss of value is called the asset's exposure.
The term 'risk' is used to describe the possibility or the likelihood of this compromise occurring.
Risk Assessment
The risk assessment process involves identifying and evaluating the risk of compromise and loss of
value that exists for each asset.
Risk Treatment
During the risk treatment process an overall strategy is defined to deal with the risks identified during
the risk assessment. Risks can be managed using one or more of the following four basic approach-
es:
- Avoiding the risk
- Accepting the risk
- Mitigating the risk
- Transferring the risk
Ignoring a risk is never an appropriate solution. However, risks can be avoided by removing poten-
tially targeted assets from an area of risk or by abandoning the business activities that create securi-
ty weaknesses.
Risk assessment and risk treatment are both subjective processes. It is therefore important that asset
owners and security personnel communicate effectively in order to successfully identify risks and cre-
ate an overall management strategy.
A qualitative approach to risk assessment provides a simple way of measuring the value of an asset
and the likelihood of a threat occurring. The values used can be described by a single word, such as
"High", "Medium" and "Low". This approach deals effectively with the shortcomings of a quantitative
approach by reducing the ambiguity inherent in figures.
Answer the preliminary diagnostic's 127 questions in order to form an initial judgement regarding
the state of security of your management framework, based on the controls, processes and pro-
cedures required by the ISO 17799 standard.
Find out more about the ISO 17799 standard and each of its controls through the explanations
provided for each question in the Guide.
Identify existing protective measures. Verify which controls have been completely or partially
implemented, are non-applicable, or do not exist in your ISMS.
Identify and classify your organization's critical and sensitive information. This classification
determines the level of importance of the information (confidential, internal use only, public, etc.)
Identify the tangible assets that process, handle, print, store or transmit the intangible information
previously identified.
The "Asset Inventory" module offers a wide range of examples of assets to help you draw up the
list of your own assets. The examples are divided among the following categories:
- Buildings and equipment;
- Documents;
- Software;
- Computer hardware;
- Human resources;
- Services
Before beginning the evaluation, customize your own evaluation scale (for example, 1- very low,
2- low, 3- medium, 4- high, 5- very high). Next, for each asset, evaluate the loss or damage that
would result from a loss of confidentiality, integrity or availability, or by contravening legislation.
Use the qualitative scale you initially defined in the "Project Management" module. Finally, justi-
fy your evaluation for each criterion for audit purposes.
Identify vulnerabilities, threats and legal and business requirements and associate them with
each asset that processes critical information.
Use the suggestions Callio Secura 17799 offers in terms of threats, vulnerabilities and legal and
business requirements in order to refine this list.
Using your own qualitative scale, evaluate the probability of threats that could exploit the vulner-
abilities that have been identified for each asset. Next, determine which criteria - Confidentiality,
Integrity, Availability, Legal - comprise the potential impact of a given threat.
View the risks you need to manage in order of priority. Risk value is calculated based on the like-
lihood of occurrence and the impact of these risks on the organization.
Risk = impact x probability of the threat occurring or of legal/business requirements not being met.
View the risk analysis report in order to make the right decision regarding each risk (reduce,
accept, avoid, or transfer).
Following your risk assessment, Callio Secura 17799 suggests administrative, technical and
physical controls for implementation in your company. Choose whether or not to retain the sug-
gested controls and justify your risk treatment decision regarding each control.
Refer to the guides in order to properly understand each control. Consult the implementation
guides, the interpretation of the standard's recommendations, security issues, the objectives
associated with each control, and the glossary, which contains over 250 words related to informa-
tion security management.
Rapidly create your security policy using the wide selection of policies and directives proposed
by Callio Secura 17799 (35 policies and over 500 guidelines divided among the 10 points of the
ISO 17799 standard).
Once your risk analysis is completed, predefined policies are proposed in the "Policy Generator"
tool. You do not need to create entirely new policies from scratch.
Create user groups and roles, then customize your policy coverage by sending each group only
those policies that deal with that group's specialty. This strategy saves time and money, and helps
complete the policy coverage in your organization.
Select, add, delete, modify and classify the policies required to meet your security needs. Entire
sections of any policy can be modified using the policy management tool. You can change a pol-
icy's scope, objectives, guidelines, and audience, as well as the person responsible and the links
between the policy and ISO 17799 controls and sections.
Prepare reports documenting your efforts to comply with internal or external guidelines.
Next, generate your customized security policy manual and export it to the document manager
for revision and, finally, company-wide publication.
Over 100 documents, including models, checklists, examples, additional information and utilities, are
available to help you implement ISO 17799 controls in your ISMS.
Choose the desired templates and export them directly into the integrated document management
tool.
ISMS Diagnostic
Verify whether your ISMS meets the requirements for BS 7799-2 certification.
The diagnostic's 81 questions will help you determine whether the ISMS framework you have
developed can be effectively implemented, controlled, maintained, reviewed and continually
improved as required by the standard.
Is the documentation required for certification being managed correctly? Is your organization
responding adequately to its inherent security responsibilities? The diagnostic will help you find
the answers.
Use the interpretation guide for each question in order to clarify the issues covered.
Document and justify the applicability or non-applicability of the 127 controls in the ISO 17799 stan-
dard to your management framework.
Document the implementation status of each control for each informational asset.
Use the audit guide to ensure the effectiveness of the implementation of each control.
Prior to the documentation audit for BS 7799-2 certification, generate the general or detailed state-
ment of applicability and export it to the document manager.
Bring together all of your files and documents, regardless of format, in a centralized database on the
Web server.
Give your various work teams access rights to one or more directories, and assign privileges, such
as reader, writer or approving officer, to each team member. Only users with assigned privileges can
access documents in the document management system. These privileges are set up by the system
administrator in the project management section.
Manage version control, follow-up, approval and publication of your files and documents.
Audit and approve files for certification.
Callio Secura 17799 provides the following reports, which you can view onscreen, print, or automat-
ically export to the document manager for later review and maintenance:
-ISMS goal and scope
-ISO 17799 compliance report
-Inventory of assets and critical information
-Risk analysis report
-Risk treatment plan outline
-Statement of applicability
-Customized security policies
These are the necessary reports demanded by the ISO 17799 / BS 7799-2 standard.
This section highlights important benefits of Callio Secura 17799 and itemizes key features that work
together to offer those benefits. Here is a quick review:
Database MySQL
Many organizations already possess the information they need to create a strong security program.
What they typically lack however is a routine, ongoing mechanism to track progress against a norm
and to build a solid framework.
Callio Secura 17799 is a simple but effective technique for implementing an information security man-
agement system framework, based on the ISO 17799 / BS 7799-2 standard.
www.callio.com
www.callio.com