Information Security Governance PDF
Information Security Governance PDF
Governance is the foundation of an ISMS, as it provides both strategic and operational frameworks.
Information security governance is an integral part of the organisations wider governance structures and
mechanisms, such as business continuity, risk management, financial planning and research ethics.
19
An ISMS should be part of the organisations risk management activities, driven by the organisations risk
appetite and implemented to enable the organisations strategic aims.
From ISO/IEC 27014, the principles of information security governance are to:
top management
business/process owners
third parties setting requirements/standards (such as the NHS, UK Government, merchant banks)
internal and/or external auditors
relevant internal professional service departments (IT Services, Legal Services etc.)
customers and end users (e.g. students and/or staff).
Identifying stakeholders and interested parties will help ascertain the applicable security requirements for
the ISMS. The primary stakeholder(s) will be those who ultimately require assurance that any applicable
requirements are being implemented appropriately. These stakeholders may also be the sponsor of the ISMS.
One of the most important things to ensure, when designing information security governance, is that there
is the capability for oversight. The organisation needs to have confidence that it is investing time, effort
and money wisely, and that its activities to manage risk are effective: or, if not, that there is a need for
improvement, and in which areas. Accountability for areas and key information assets should be clearly defined
(see Chapter 8, Roles and competencies).
In the financial industry, measures are taken to reduce the risk of cognitive bias: the same should exist in the
realm of information security.
In order to achieve these two complementary goals, the organisation should ensure that it gives a group or
body the formal responsibility for reviewing the effectiveness of the organisations activities to manage risk.
This can be a formal governance body, supported by an executive group made up of staff with responsibility
for aspects of risk management. The body with such responsibilities should be independent of the areas upon
which it is reporting.
20
The Audit Committee in an organisation should review the risk register; similarly the internal audit function
has a role in reviewing policies and procedures, recommending control systems and monitoring their
implementation.
review the ISMS and play a role in its continual improvement (see Chapter 12, Continual improvement)
act as the focal point for co-ordination of cross-organisational controls and conflict resolution
provide regular performance reports (see Chapter 10, Measurement) to the Audit Committee or similar
body
provide advice and expert assistance, including carrying out risk assessments.
Note: This structure contains the risk of conflict of interest, as the CISO team is responsible for advising on
controls as well as measuring and reporting on the effectiveness of the ISMS; care should be taken to ensure
separation of duties to manage this risk.
21
Protection of reputation a security breach (and a badly handled aftermath) brings bad publicity, and
potential litigation and/or fines, which all damage the corporate reputation and can result in the loss of
funds from research and students. An effective ISMS supports the UKs National Security Strategy and its
focus on cybercrime and thus can be promoted as a reputation enhancing activity.
Ensuring continued revenue most funding councils are now asking for assurances that the information
which is to be used in research is to be properly protected.
Risk management top management is de facto responsible for information security risk. An ISMS
provides them, and their governing body and funding body, with assurance that the risk is being
appropriately managed throughout the organisation.
Effective use of resources - an ISMS can lead to more efficient ways of working and best use of resources
as controls are deployed (or relaxed) in a co-ordinated, cross-organisation manner to meet the corporate
risk appetite. This can lead to higher staff satisfaction as policies are made clear, training is provided and
resources are provided to allow application of controls.
Customer satisfaction - staff and students can feel assured that their own personal data is held securely
and that their identity is safe. In the absence of an ISMS, how confident is top management that their
own personal data is safe in the organisations hands? Are they happy for their own salary details or
performance reviews to be held in insecure systems, or potentially accessible by untrained staff in a cyber caf?
Top management have very little time to spend on any topic: keep your presentations, documents and
arguments very brief.
improvement, and the opportunity to really get benefit from information held by the organisation (now it
will know what it actually holds).
Use fear, uncertainty and doubt arguments with great care - only make cases based upon provable fact,
e.g. recent and relevant incidents within the organisation.
Be prepared to show your working on any particular statement you make in a document.
2.7.4 Preparing a business case
Visual representations
of what you are trying to
achieve, and how you
plan to get there, can
be more effective than
lengthy narratives.
22
In order to secure resources for an ISMS, an initial or outline business case should be presented. It should
include relevant drivers as described above and provide an outline of the costs involved in setting up and
maintaining an ISMS.
The business case may, if appropriate, explain how the ISMS will provide a return on investment; this is more
of a challenge, since an ISMS is largely insurance against loss. It helps to be able to compare the ISMS costs to
a published index of costs incurred by similar sized organisations as a result of a major information security
breach, such as the annual Information Security Breaches Survey Report commissioned by the Department
for Business, Innovation and Skills. An initial outline risk assessment may also be used to support the business
case (see Chapter 5, Risk assessment).
Relevant metrics should be identified to show how the information security team will be able to measure and
report on the effectiveness of the ISMS.
It is important to continually reinforce that the purpose of an ISMS is to achieve a level of security which
is consistent with the organisations risk appetite and which enables corporate objectives. Once a project
or programme to establish an ISMS has been agreed and an initial risk assessment exercise undertaken, it
is often the case that the originally agreed risk appetite is modified when the financial cost of the security
controls required to meet that appetite is presented to the organisations executives. It is important, however,
to keep reflecting the costs back in terms of the risks mitigated and make it clear that a decision not to spend
is in effect a decision to accept a specific risk - and that this is perfectly acceptable as long as it is explicitly
understood by top management.
Summary
Resources
Reading list
http://blogs.gartner.com/debra_logan/2010/01/11/what-is-information-governance-and-whyis-it-so-hard/
23
24