Information Security Strategy - Guide

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 14

Guide for developing an

Information Security Strategy



Uploaded February 2009

References:
Frey Sigurjonsson, SITE Sweden
Kenneth Hellem, SITE Sweden
Copyright 2009 Accenture All Rights Reserved.
2
Contents
Information security strategy development process
Determine security baseline
Understand business drivers and define security objective
Identify and prioritize gaps
Develop implementation/action plans
Implement activities
Copyright 2009 Accenture All Rights Reserved.
3
The strategy for information security is developed
through a four step process
Implement
activities
Understa
nd
business
drivers
and
define
wanted
position
Develop
implementation/
action plans
Define
target
state
Determi
ne
informa
tion
security
baselin
e
Step 1 Step 2 Step 3 Step 4 Step 5
Assess how security
needs to change in
the organization in
the next three to five
years in order to
adequately support
the business
Determine the current
state of information
security, e.g.
-Information assets
-Processes
-Governance
-Organisation
-Risks
Prioritize business
needs and define a
target state
Determine solutions
to reach target state
and their associated
cost/effort, define
budget and create
road map
D
e
s
c
r
i
p
t
i
o
n

D
u
r
a
t
i
o
n

1-2 weeks 2 days 2-3 days 1 week
A
p
p
r
o
a
c
h

Collect and analyze
secondary data
Perform qualitative
and quantitative
interviews and/or
surveys of IT and
business
Perform qualitative
interviews with IT
and business
management
Articulate policy
statement
Describe target
state, e.g. as
capability
improvements
and eliminated
risks
Create roadmap of
activities to bridge
target state and
current position
Copyright 2009 Accenture All Rights Reserved.
4
ISO 17799 Information Security Domains*
The ISO Information Security Domains can be used as
a model to assess maturity
Compliance
Business
Continuity
Management
Information
Security
Incident
Management
Information
System Acq.
Dev. and Maint.
Access
Control
Communication
& Operations
Management
Physical and
Environmental
Security
Human
Resources
Security
Asset
Management
Organization of
Information
Security
Security
Policy
Information
Assets
* See appendix for domain descriptions
Copyright 2009 Accenture All Rights Reserved.
5
Risk and Strategy
What are your main security concerns and do you have plans to fix them?
Is there any security initiative, which is not progressing as you would like? In a positive case, what is slowing it down and
what would be required, in your opinion, to make it happen?
What are your thoughts on where security can be improved/ increased?
Do you have an ongoing process to classify data (Confidentiality, Integrity and Availability), assets value, threats and
vulnerabilities?
Have you identified main Business and Information Assets with their related value? This is relevant for both Risk
Assessment and Business Continuity Management.
Are you aware of any recent security incident within your organization or other competitors, which have called attention to
the press or customers?
Do you have difficulties in prioritizing security investments and receive approval from the board?

Compliance, Organization and Management
Are you currently struggling to comply with existing regulation (e.g. European Data Privacy, Sarbanes-Oxley, etc.)? If so,
which regulation?
Are you aware of new regulations you will need to comply with that will impact your security capability?
Are you planning to achieve any secure certification (e.g. ISO27001) and if so, within which timeframe?
Have you received any feedback from internal or external auditors, which requires your company to implement specific
security measures?
Are you comfortable with existing security policies, procedures, roles and responsibilities, and the level of compliance
and awareness from your permanent and temporary staff?
Which metrics do you use to monitor ongoing level of security and compliance, and which actions do you take to correct
them?
Do you feel comfortable with the existing level of security provided by third-parties and are you considering to outsource
any security-critical service to external parties?
The first step is to determine the security baseline
through qualitative and quantitative interviews
Sample qualitative questions
Copyright 2009 Accenture All Rights Reserved.
6
The first step is to determine the security baseline
through qualitative and quantitative interviews
Maturity Scale
Nothing Ad-hoc Repeatable Defined Managed Optimized



Sample quantitative questions
7.1 RESPONSIBILITY FOR
ASSETS
Is there an inventory of key
information assets (data
sources)?
7.1.1 Inventory of assets
Is it clear who owns / is
responsible for the assets?
7.1.2 Ownership of
assets
Are there guidelines for
classifying assets?
7.1.3 Acceptable use of
assets Are the assets classified?
Copyright 2009 Accenture All Rights Reserved.
7
The wanted position is determined by interviews with
business and IT and articulated in a policy statement
Sample Information Security Policy Statement
Objective
The Information Security Principles is a tool for management team at ClientCo to set direction in regards
to protecting Diaverums Information Assets (Data Sources) in regards to:
Confidentiality - Data should only be accessible by authorized users
Integrity - Data should be authentic, sufficiently accurate and reliable
Availability - Data should be accessible when needed


Principles
Information Security has the endorsement and support of executive management and the Board
- Management is delegated to an appropriate security organization with clear roles and responsibilities
Everyone is responsible for Information Security (Clinics, HQ, Corporate and External Parties)
- Awareness is built through continuous training and communication, and clear policies
The organization strives to be compliant with all regulatory requirements
- The regulatory environment is continuously monitored, and compliance is audited regularly
Protection of data is critical in a highly regulated market
- Proper access controls is combined with high awareness of data sensitivity
Risk exposure is balanced with the cost of risk mitigation
- Risks are understood and managed based on potential business impact
Security measures are proactively implemented based on a comprehensive understanding of threats
- Industry standards (E.g. ISO17799) are used to baseline capabilities and assess potential gaps
Copyright 2009 Accenture All Rights Reserved.
8
The target state is expressed as capability
improvements and eliminated risks
Example output from target state definition
Copyright 2009 Accenture All Rights Reserved.
9
Solutions to reach the target state are identified and
combined into an implementation road map
Proposed initiatives to reach target state
Tier I: Secure
fundamentals
Tier II: Enable strategic
agenda
Tier III: Enable differentiation Actions Actions
Actions
Actions Actions Actions
Actions
Actions Actions Actions
Copyright 2009 Accenture All Rights Reserved.
10
The final step is to initiate the implementation
Initiatives
Effort
(Man days)
2009 2010 2011 2012
Ensure regulatory compliance 34
Audit and secure critical assets 28
Design security organisation 6
Develop security policy 23
Design security processes 40
Create individual policies 19
Secure standards and processes 12
Create guidelines 15
Implement ISO 27001 25
C
r
i
t
i
c
a
l

R
e
q
u
i
r
e
d

D
i
f
f
e
r
e
n
t
i
a
t
i
n
g

Example implementation road map
Copyright 2009 Accenture All Rights Reserved.
11
Appendix
Copyright 2009 Accenture All Rights Reserved.
12
Definition of CMMI Maturity levels
0. Non-existent
1. Initial
2. Repeatable
3. Defined
Complete lack of any recognizable processes. The enterprise has not even recognized that
there is an issue to be addressed.
There is evidence that the enterprise has recognized that the issues exist and need to be
addressed. There are, however, no standardized processes; instead there are ad hoc
approaches that tend to be applied on an individual or case-by-case basis. The overall
approach to management is disorganized.
Processes have developed to the stage where similar procedures are followed by different
people undertaking the same task. There is no formal training or communication of standard
procedures, and responsibility is left to the individual. There is a high degree of reliance on
the knowledge of individuals and, therefore, errors are likely.
Procedures have been standardized and documented, and communicated through training.
It is, however, left to the individual to follow these processes, and it is unlikely that deviations
will be detected. The procedures themselves are not sophisticated but are the formalizations
of existing practices.
4. Managed
It is possible to monitor and measure compliance with procedures and to take action where
processes appear not to be working effectively. Processes are under constant improvement
and provide good practice. Automation and tools are used in a limited or fragmented way.
Definition of CMMI maturity levels:
5. Optimized
Processes have been refined to a level of best practice, based on the results of continuous
improvement and maturity modeling with other enterprises. IT is used in an integrated way
to automate the workflow, providing tools to improve quality and effectiveness, making the
enterprise quick to adapt.
Copyright 2009 Accenture All Rights Reserved.
13
Description of the ISO17799 domains aim and focus: (1/2)

1. Security Policy To provide management direction and support for information
security in accordance with business requirements and relevant laws and
regulations.
2. Organization of Information Security To manage and plan information security
within the organization, taking into account the needs of both internal and external
parties.
3. Asset Management - To deliver appropriate levels of protection and ensure that
information receives a level of protection that is appropriate to its needs.
4. Human resources (personnel) Security - To ensure that staff, during
employment, after termination and during change of employment, are part of the
information security process.
5. Physical and Environmental Security To secure buildings, locations and
equipment in such a way as to prevent unauthorized physical access, damage and
interference to the organization's assets, premises and information.
Copyright 2009 Accenture All Rights Reserved.
14
6. Communications and Operations Management - To ensure that information is
treated properly, backed up correctly and handled securely to the highest
standards available.
7. Access Control - To control access to information, networks, and applications.
Preventing unauthorized access, interference, damage and theft.
8. Information Systems acquisition, development and maintenance - To ensure
that security is an integral part of the information system. Securing applications,
files and reducing vulnerabilities.
9. Information Security Incident Management To ensure information security
events and weaknesses are communicated consistently in a manner allowing
timely corrective action to be taken.
10. Business Continuity Management To counteract interruptions to business
activities and to protect critical business processes from the effects of major
failures of information systems or disasters and to ensure their timely resumption.
11. Compliance - To avoid breaches of any law, regulation or contractual obligations.
To ensure compliance without adverse affects on Information Security.
Description of the ISO17799 domains aim and focus: (2/2)

You might also like