Cism Ilt Module1
Cism Ilt Module1
MODULE 1
Overview
Topics
• Strategic Planning
Learning Objectives
• Describe the role of governance in creating value for the enterprise.
Exam Relevance
Information is an Information is
Information is indispensable accessible
critical to everyday component of through broad
life. conducting array of
business. technology.
Elements of
Enterprises must
IT comprises key national critical
act to protect
elements in most infrastructure may
critical
enterprises. be privately owned
information.
and operated.
Executives Executive
Information Systems
Senior
Decision Support Systems
Managers
Middle Management Information Systems
Managers
Governance Management
10
Value Creation
Additional considerations:
• Competition in the
Realize benefits at optimal resource cost while optimizing
global economy
risk.
• Dependence on
information and
Benefits can vary based on the enterprise.
supporting systems
11
12
Importance of IS Governance
• Information and knowledge
Governance includes elements to provide senior management with: are important assets to an
enterprise.
• Reliance on information
Assurance that their direction and and related systems
intent align to the enterprise demonstrates the criticality
security posture of information security
governance.
13
Develop, implement and manage a security program that achieves six basic outcomes:
14
15
Cybersecurity
Information Security Cybersecurity
Analog Information
Network Hardware
Intellectual Property
Software
Digital
Paper Documents
Information processed
Information
Verbal Communications and stored in isolated
networks or systems
Visual Communications
16
Endpoint Hygiene
Data Protection Network Design Secure System Build
Certificate Management CI/CD integration
Container Security
Security UX
Security Architecture Cryptography "Shift Left"
Cloud Security Encryption Standards
Federated Identity Security QA
SAST Open Source Scan
Vaulting
Access Control Key and Secret Management S-SDLC API Security
MFA & SSO Source Code Scan
HSM
Identity Management
Security Engineering CIS Top 20 Controls 4th Party Risk
ISO 27001 Application Security Assets Inventory
CIS Benchmarks Vulnerability
27017
Identity & Access 27018 scan
Privileged Access Infrastructure
Management Management NIST Cybersecurity 3rd Party Risk (Network and Systems)
Framework OWASP Top 10 Data-Flow Diagram
Certifications
(WebApp & API)
Penetration test Social Engineering
Training Conferences Risk Assessment
Career Development MITRE DAST
Frameworks
ATT&CK Risk Monitoring Services
and Standards Framework
Coaches and Risk (Risk score)
Application Pen Tests
Role Models Acceptance
Peer Groups Self Study Risk Treatment Statement
Actions 1. Process Owners
Cyber Insurance
IoT Security Physical Security Infosec / Cybersecurity 2. Risk Mgmt Group PCI
Enterprise Risk Management Lines of Defense
Standard Guideline
Procedure
17
Assurance
• Policy compliance
Trust
• Critical decisions
• Risk management • Potential liability Accountability
• Process improvement • Predictability
• Incident response • Trading partners • Safeguarding information
18
19
Organizational Culture
Information security is primarily influenced through transparency and accountability within the enterprise
culture and must be considered in determining roles and responsibilities.
20
Enterprise IT Archetypes
Business monarchy - A group of business executives or individual executives
(CxOs); includes committees of senior business executives (may include CIO);
excludes IT executives (Example CTO)
Federal - C-level executives and business groups (e.g., business units or processes);
may also include IT executives (Example CTO) as additional participants
Duopoly - IT executives (Example CTO) and at least one other group (e.g., CxO or
business unit or process leaders)
21
22
Organizational Structure
Understanding the organizational hierarchy and structure leads to better understanding of key
stakeholders who influence the information security strategy.
Operating Responsibilities
Roles
structures
23
24
RACI Chart
R A C I
25
26
Board of Directors
Senior Management
Steering Committee
Workforce
27
Executives
28
IT Steering Committee
29
Governing boards
Chief risk officer Chief information
and senior
(CRO) officer (CIO)
management
Security awareness
Business and
IT security trainers (security
functional
practitioners subject matter
managers
professionals)
30
31
32
A formally established
Defined and applied
organizational structure with a
escalation procedures
clear, documented mandate
Organizational structure
Documented and followed
performance objectives to
operating principles
identify, monitor and adjust
33
34
Because laws and regulations vary across Treat compliance as any other risk:
the globe, enterprises may need to:
• Extent of compliance is a business
• Establish different security strategies decision made by senior management
based on the regions they operate
• Use automated GRC tools to help
• Set policy based on most restrictive maintain a comprehensive catalog of
requirements for consistency legal and regulatory requirements
35
Third-Party Contracts
Service Level
Legal Requirements
Agreement
Management of
Legal Liability
Outsourcing
36
Different
Within the Remote Remote Same Remote Same
geographical
enterprise location location country location continent
area
37
Take
advantage of
May require Combination of
Use of internal Essential to Will require the benefits
Geographical Ease of the acquisition service
IT staff and daily business staff training that each
proximity communication of additional delivery
services operations and education sourcing
resources options
alternative
provides
Insourcing Hybrid
38
Sourcing Approach
Develop strong
Develop project Perform due
sourcing
team diligence
strategy
Develop
Request for requirement Evaluate RFP
proposal definition and Responses
RFP
Develop
Negotiate Develop contract
contract transition plan governance
framework
39
Due diligence
Baselining and benchmarking
Govern Governance processes
Governance enterprise
Scope reviews
Roles and responsibilities
Allocate
40
41
42
43
44
Reduce risk to
Provides plan of Controls used to
acceptable levels Provide business
action to detect anomalies
while optimizing process
accomplish must consider
resources and assurance and
enterprise goals nontechnical
addressing legal maximize
and outlines attacks from
or regulatory success
structures insiders
requirements
45
Maturity Models
46
Business
Provides and enables: Goals and
Objectives
Information
Information
Security
Security
Plan of action to Strategy
Strategy
Objectives
accomplish
enterprise needs Strategy
Development
Objective
The
and
Desired
Business
State
Achieve acceptable Integration
level of risk while
optimizing resources Current
Conditions
47
Strategic Alignment
What are the strategies and goals of program?
• Define strategy objectives
Effective Risk Management
• Develop metrics to measure progress
Value Delivery
Resource Optimization
Strategy addresses: Requires
48
Classification Valuation
Provides the basis for applying protective Difficult to determine with precision:
measures proportional to business value:
Create levels of value (0-5)
• Sensitivity is a subjective call
• Assign values to prioritize protection efforts
and determine required levels of protection
Conduct business dependency evaluation
• Mitigates cost of overprotecting or under-
protecting information
• Develop policies, standards and processes
concurrently to mandate classification
49
50
Desired State
Denotes a complete snapshot of all relevant conditions at a future point
51
52
Security
CISO/Steering Security Action Plan Policies, Standards Programs
Committee
Strategy Inputs:
Implement
• Current state and desired
security state
Action Plan Inputs
• Business processes and Available
requirements Resources and Security Objectives
• Risk assessment Constraints Monitor/Metrics
• ©2022
Regulatory requirements ISACA. All rights reserved
Trend Analysis
©2022 ISACA. All rights reserved.
53
54
Pitfalls Bias
Overconfidence Confirmation bias
Optimism Selective recall
Anchoring Biased assimilation
Status quo bias Biased evaluations
Mental accounting Groupthink
Herding instinct
False consensus
©2022 ISACA. All rights reserved
©2022 ISACA. All rights reserved.
55
Road Map
Resources
Constraints
56
Road Map
57
Road Map
Short-term
Chart the road projects aligned
Long-term goal Broken down into map, with long-range
consisting of a smaller projects understanding Some objectives objectives can
series of projects accomplished on that there is not a will change over provide
and initiatives a reasonable steady state of time checkpoints,
timeline information opportunities to
security adapt and metrics
to validate
58
Resources
59
Constraints
Some constraints could be addressed when
defining the desired state.
Legal Others will arise from developing the road
Physical map and action plan, including:
Ethics
Magnitude Legacy
of Effort Systems
Culture
Personnel
Organizational structure
Resources
Existing Emerging
Capabilities Technologies Technologies
or Processes
Time
Risk appetite
60
61
62
Framework Elements
63
Controls
64
65
Architectural Frameworks
Describe a method for Evolved to better Provide linkages to and
designing the target address business design design of the business
state of the enterprise in and development of side of information
terms of blocks security requirements protection
Zachman Extended
Enterprise Enterprise
COBIT TOGAF
Architecture Architecture
Framework Framework
66
Definitions
• Framework
• Provide guidance on how to build Individual architectures that will be
useful to a diverse set of individuals
• Architecture
• Conceptual Construct
• Tool to help individuals understand complex items
• It expresses enterprise structure (form) and behaviour (function)
• Security Program
• It is a framework made of many entities working together to provide a
protection level for an environment
• A security program should work in layers
• Security via obscurity is not a healthy protective mechanism
67
COBIT
• It’s a model for IT Governance
• Is a framework for governance and management developed by ISACA
• It’s a holistic approach with key principles
• Meeting stakeholder needs
• Covering the enterprise end to end
• Applying a single integrated framework
• Enabling a holistic approach
• Separating governance from management
• Its ultimately linked to the stakeholders
• It deals at the operational level
• Majority of security compliance audit practices are based on COBIT
• Latest Version is COBIT 2019
68
69
NIST 800-53
• Developed by NIST
• Outlines the controls that (US) agencies need to put into place to be
compliant with the FISMA Act
• There are many control categories addressed by this
• They are management, operational, technical controls prescribed for
an information system to protect CIA
• As COBIT is for Private compliance needs, NIST is for US Government
compliance needs
70
71
• Design
• Transition
• Operation
• Continual Improvement
72
73
74
75
76
77
78
79
Balanced Scorecard
Financial
Goals Measures
Strategic planning and
management system to
communicate and align strategy,
prioritize, and measure
performance. Customer Process
Information
• Develops metrics
Goals Measures Goals Measures
• Collects data
• Analyzes data
Learning
Goals Measures
©2022 ISACA. All rights reserved
©2022 ISACA. All rights reserved.
80
81
Strategic Planning
82
83
Strategic Planning
Assurance of compliance
• Audit
with mandatory • Compliance
requirements
84
85
86
• Programs for end users reinforce • Determine appropriate skills and areas of
importance of enterprise information improvement needed to protect enterprise.
security
• Target specific systems, processes,
• Must be considered in strategy policies, enterprise norms and security
development context
• Ensure security policy compliance is easy • Integrate into existing programs and
to follow and manage initiatives to close gaps and align security
with the business
87
Assurance Provisions
Compliance
Audits Enforcement
88
Gap Analysis Required for various components of the strategy previously discussed, such as
maturity levels, each control objective, and each risk and impact objective.
Action Plan Metrics The plan of action to implement the strategy requires methods to monitor and
measure progress and the achievement of milestones.
Intermediate Goals A variety of specific near-term goals that align with the overall information security
strategy can readily be defined after the overall strategy has been completed.
89
90
• Ensure that what is being measured is relevant to • Consider how metrics will be used for ongoing
provide information necessary to make decisions monitoring and measurement of progress
• Define the decisions made and who makes them • Determine current state to track changes and
progress over time
• Collaborate with business process owners and
management to determine relevant metrics • Use CMMI method to define current state and
objectives
• Supply appropriate metrics timely and accurately.
• Can use process assessment model to perform
ongoing gap analysis and progression toward goals
91
KPI
CSF
92
Tactical Metrics
• Regulatory compliance
status
93
94
95
Information Security
Strategy
Information
Identify Treat
Security Risk
Assess
Information
©2022 ISACA.Security Models
All rights reserved
©2022 ISACA. All rights reserved.
96
97
98
Module Summary
99
Summary
• Strategic Planning
100
Module Complete
101