What are some key activities that managers need to be mindful of when creating a risk assessment policy?
Organizing information security
It is both practical and sensible to consider the organization’s information security management structure at an early stage in the implementation process. This does, in fact, need to be thought through at the same time as the information security policy is being drawn up, as set out in Chapter 5. An effective information security management structure also enables the risk assessment (to be discussed in Chapter 6) to be carried out effectively.
The second control category in Annex A to the standard, in clause A.6.1, is ‘Internal organization’. Controls are selected to meet business, regulatory or contractual requirements (the baseline security criteria), or in response to the risk analysis (see Chapter 6); there is a business requirement to put an information security management structure in place from the start of the ISO27001 project. The control objective of control A.6.1 is to ‘establish a management framework to initiate and control the implementation and operation of information security within the organization’.
This objective encourages the creation of the management information security forum identified in earlier versions of the standard. More impor- tantly, it no longer prescribes any specific management structure; the key requirement is management’s active support for and commitment through- out the organization to the ISMS project. Without this, neither certification nor the project itself will be successful. Clause A.6.1.1 of ISO27002, says that information security responsibilities should be defined and allocated (which reflects also the requirement of ISO27001 clause 5.3) and explains, what best practice expects in terms of the allocation of roles and responsi- bilities. At the same time, the competence requirements of Clause 7.2 should also be considered.
IT GOVERNANCE56
Internal organization
ISO27002 echoes the requirement that managers should actively support security within the organization through ‘clear direction, demonstrated commitment, explicit assignment and acknowledgement of information security responsibilities’. In practical terms, this means that managers should set up a top-level forum or steering group to ensure that there is clear direc- tion and visible management support for security initiatives within the organization. It could be part of an existing management body, which might be appropriate in a smaller organization where the members of the top management team will also, broadly, be the members of an information security forum. More usually, it will be a separate cross-functional body, adequately resourced for its responsibility, reporting to a member of the top management team and reflecting top management support and commit- ment. In this book, we will usually refer to this management group as ‘the forum’. The effectiveness of this forum will be fundamental to both the effectiveness of the ISMS and compliance with clauses 5.1, 5.2 and 5.3 of the standard.
ISO27003, the formal guidance on ISMS implementation, identifies roles for an information security committee and an information security planning team. The information security committee should have delegated manage- ment responsibility for information security within the organization. The information security planning team is responsible for planning implementa- tion of the ISMS, resolving inter-departmental conflict and ensuring that the ISMS project runs to plan. In practical terms, in most organizations, the forum which was described earlier will usually evolve into an information security committee which effectively has governance responsibility for infor- mation security. In most organizations, it makes sense for the forum to have both roles: ownership of the ISMS and responsibility for planning and deploying it. In much larger organizations, it is usually sensible to follow the guidance of ISO27003: senior managers, who might be involved in the forum or committee, are not usually able to take part in the actual project work. Towards the end of the project, it is usually practical to merge the two groups, retaining an appropriate mix of roles and skills on the information security committee or future forum so that the ISMS can be maintained and developed after certification.
An effective approach to establishing the forum would be to seek member- ship from all levels of the organization, and from all parts of the organization that are likely to be affected by the ISMS project. Including, for instance,
ORGANIZING INFORMATION SECURITY 57
those who handle incoming physical mail, IT helpdesk staff, and user repre- sentatives will help the forum fully consider all relevant practical issues before making policy or procedure recommendations.
Once the ISMS has been fully established, the forum could become the information security committee identified by ISO27003, or could simply continue to be the forum. Whatever, it should meet at least twice a year and preferably quarterly. All its activities should be formally documented, together with its decisions and the reasons for them. Copies of all material presented at the meetings should be retained, and subsequent meetings should track actions agreed, report on progress for each of them and docu- ment these steps. This group should be responsible for:
1 Identifying information security goals and strategy that meet the organization’s requirements; ensuring that goals are communicated and understood, checking whether there are adequate resources for achieving them, and whether the ISMS is properly integrated into the organization’s processes and business as usual.
2 The review and approval of the organization’s information security policy, which must be explicitly agreed and supported by top manage- ment setting the scope of the ISMS, ensuring that information security objectives and plans are established, identifying internal and external issues and the requirements of interested parties, and agreeing how roles and responsibilities should be allocated. This should include appointing, or agreeing the appointment of, the manager responsible for informa- tion security within the organization, together with the key responsibilities of the role; this role could be given the explicit responsi- bilities identified in clause 5.3: to ensure that the ISMS conforms to the requirement of ISO27001 and to report to Top Management on the performance of the ISMS.
3 Ensuring that sufficient resources are provided to develop, implement, operate and maintain the ISMS.
4 Monitoring changes in exposure of key organizational information assets to major threats, deciding (within the context of any existing organizational risk treatment framework) acceptable levels of risk and ensuring that awareness of these threats is developed, as well as ensuring that the importance of complying with the ISMS is adequately commu- nicated to the organization.
5 Ensuring that procedures and controls are implemented that are capable of promptly detecting and responding to incidents, as well as the review
IT GOVERNANCE58
and oversight of information security incidents. Receiving reports from the information security manager on the status and progress of specific implementations, security threats, results of reviews, audits, etc and ensuring that adequate steps are taken to implement findings or deal with non-conformities.
6 The approval of major initiatives (such as any individual initiative asso- ciated with the implementation of ISO27001) to improve information security within the organization, including security aspects of systems acquisition.
7 Establishing means of monitoring and ensuring compliance with the policy and reviewing the effectiveness of these measures periodically.
8 Ensuring that information security objectives and requirements meet the business objectives.
9 Ensuring that control implementation is coordinated and effective across the organization.
10 Ensuring that adequate steps are taken, on an ongoing basis, to continually improve the ISMS.
Management review
ISO27001 introduces, at clause 9.3, a requirement for a management review of the ISMS, and this should take place at predetermined intervals agreed by the board, whenever there have been significant changes to the organiza- tion’s risk environment, or business organization, and at least annually. The review process is similar to that required by ISO9001, and ISO27001 sets out clearly and in adequate detail the minimum inputs and outputs expected of such a review, which, ideally, should be carried out by the forum and, again, involve top management. The inputs are all discussed at appropriate points in this book, and the information security manager should be made responsible for gathering together the inputs and communicating, to all concerned, the outputs (decisions) of the review.
Management reviews should be fully documented, with an agenda, with minutes, and with follow-up actions. In integrated management systems, management review is likely to consider all aspects of its integrated manage- ment system: quality, environment, IT service management, information security and so on.
ORGANIZING INFORMATION SECURITY 59
The information security manager
Although good practice expects one manager to be made responsible for the co-ordination of all security-related activities, this is not a specific require- ment of ISO27001. There are potential conflicts between accepted good practice, the requirement for impartiality in ISO27001 clause 9.2.e, control A.6.1.2 for segregation of duties, and the resources actually available to the organization. One should pay particular attention to the standard, to the competences required of the role, and to reality when finalizing these arrangements. It is also worth bearing in mind that the organization may – depending on the expertise of the person selected for the information security manager role – also need access to specialist information security advice; if this is not provided by the person who manages the ISMS, it could be provided by someone else. That is entirely a matter for the organization concerned.
Practical experience demonstrates that one person really will need to be charged with managing the ISMS project, and this person should be appro- priately qualified. He or she could be appointed before the forum is set up, and his or her brief could include the formation of the forum. The benefit in this route is one of speed and, potentially, of simplicity. The board member who has been charged with responsibility for ensuring implementation of the ISMS could simply select and appoint an appropriate person and an initial project team, who could then take things forward. The selection and training of the members of a forum are potentially more time-consuming, and the period during which they are learning their roles will precede the point at which they are competent to select and appoint an appropriate information security manager. The organization may not wish to pursue this slower route.
While the information security manager does not need to be the same person as is appointed as the organization’s information security expert (the skill sets required for the managerial role, particularly in a larger organiza- tion, are likely to be different from those required for the security expert’s role), this person will still need adequate training in information security matters, and the discussion later in the chapter, headed ‘Specialist informa- tion security advice’, should be read in conjunction with this section. Obviously, the person selected for the managerial role will need to be an effective manager with well-developed communications and project manage- ment skills.
IT GOVERNANCE60
This manager should be charged with a number of defined and key activ- ities. Depending on the culture and structure of the organization, these could include:
1 Establishing the management information security forum (unless the organization chooses to establish the forum first and then ask the forum to select the manager).
2 Formalizing, with the forum, a standard glossary of terms. Words like ‘risk’, ‘threat’ and ‘incident’ mean different things to different people and it makes practical sense to have a standard corporate glossary that provides standard definitions of all the terms that are used for informa- tion security or in any of the management systems. ISO/IEC 27000 is a good place to start, in that it contains a full set of terms applicable to the ISMS. Other terms from other standards and frameworks (eg business continuity, or ITIL, or COBIT) could be added as required.
3 Developing, with the forum, the security policy, its objectives and strategy.
4 Defining, with the forum, the scope of the ISMS, taking into account internal and external issues and the requirements of interested parties.
5 Briefing the forum on current threats, vulnerabilities and steps taken to counter them.
6 Working with risk owners to carry out the initial information security risk assessment.
7 Ensuring risk owners identify changed risks and that appropriate action is taken.
8 Ensuring that the risk is managed by agreeing with the board, risk owners and the forum, the organization’s approach to risk management, the risk treatment plan and the level of assurance that will be necessary.
9 Selecting control objectives and controls that, when implemented, will meet the objectives.
10 Preparing the statement of applicability and risk treatment plan.
11 Recording and handling security incidents, including establishing their causes and determining appropriate corrective and/or preventive action.
12 Reporting to the forum on progress with implementing the ISMS, and on incidents, issues, security matters and current threats.
13 Ensuring management reviews are carried out as required.
ORGANIZING INFORMATION SECURITY 61
14 Monitoring compliance with the standard and reporting to management on the effectiveness of the ISMS.
15 Driving continual improvement activity across the entire ISMS.
The cross-functional management forum
The concept of a cross-functional forum has disappeared from ISO27001. It was a sensible idea and organizations should consider setting one up. The driving logic is that information security activities would be coordinated by representatives from different parts of the organization with relevant roles and job functions. This is particularly relevant for larger organizations, where security activity needs to be coordinated across a number of divi- sions, companies or sites, each of which may have its own information security manager or adviser. This cross-functional forum could, in smaller organizations, be integrated into the management information security forum discussed earlier. The range of activities that might be carried out by this cross-functional forum are:
1 agreeing, across the organization, specific roles and responsibilities in respect of information security;
2 agreeing the specific methodologies and processes that are to be used in implementation of the information security policy;
3 agreeing and supporting cross-organizational information security initiatives;
4 ensuring that the corporate planning process includes information security considerations;
5 assessing the adequacy and coordinating the implementation of specific controls for new systems, products or services;
6 reviewing information security incidents;
7 supporting the communications strategy and ensuring that the whole organization is aware of the way in which information security is tackled.
There is a lot of overlap between the possible functions of the management forum and the cross-functional group described earlier in this chapter. An external certification auditor will want to know how the two key functions – coherent management of information security and coordination of infor- mation security-related activity – have been tackled. One route, clearly, is
IT GOVERNANCE62
for each forum to have very clearly differentiated functions and for the reporting lines between the two to be drawn very unambiguously.
Usefully, in all but the largest organizations these two forums can be combined. Practically, this is sensible, as otherwise the structural issues of relating the two forums and of clarifying what issues are dealt with at which level can create unnecessary bureaucracy. Where two separate groups are set up, the first to operate more at the strategic level and the second more at the implementation level, the time of the information security and functional specialists will be stretched as they will need to contribute to both. The managerial benefits of combining the two groups are so significant that this book will proceed on the basis that this is the appropriate route, and our use of the term ‘forum’ from now onwards will refer to this combined group.
The detailed work of the management forum is then best dealt with by asking the manager responsible for information security to draw up, outside the formal meetings, proposals as to how each of the issues should be dealt with.
These proposals should then be tabled, discussed and agreed by the forum. All meetings of this forum should be documented, as should actions agreed and progress against them.
The ISO27001 project group
Ideally, the forum should be set up at the outset of the project and be chaired by the senior executive or board member who is designated as responsible for the implementation of the ISMS. The forum should, initially, and in most smaller organizations, also be the project team that sees implementation through to successful conclusion and whose ongoing role clearly evolves from this initial responsibility. This intention should be clearly documented in the project plan and in the first minutes of the forum and/or terms of reference for the group.
Members
Members of the forum, a number of whom need to be in senior positions within the organization, should be selected from across the organization. Key functions that should be represented are quality or process manage- ment, human resources, training, IT and facilities management; these may all have to change their working practices significantly as a result of the
ORGANIZING INFORMATION SECURITY 63
decision to implement an ISMS. Apart from the manager responsible for information security and the trained information security expert, the most critical representation will be from HR, sales, operations and administra- tion. These tend to be the functions in which the majority of the organization’s personnel are employed and the ones that will be most affected by the imple- mentation of an ISMS. While the people invited to represent these functions should be among the most senior and widely respected individuals within them, it can also be beneficial to draw in representation from more junior ranks and certainly from end users. Without this perspective, the forum may be inadequately aware of issues ‘on the ground’, and may arrive at conclu- sions that, in practical terms, are difficult to implement.
As discussed earlier, the change process that ISO27001 implementation will require has a cultural impact. It is critical that those most able to repre- sent and articulate the needs and concerns of the key parts of the organization are included on the working party. Without their involvement, there is unlikely to be the ‘buy in’ necessary for the ISMS to be effectively developed and implemented.
Clause 7.2 of the standard requires the organization to ensure that all personnel are competent to perform the tasks assigned to them in the ISMS. This will require the organization to determine the competences required, first of the forum members and later of those charged with implementation. This chapter has pointed at the range of competences that may be required, and final decisions should be documented. See also the discussion on train- ing in Chapter 8.
As soon as the members of the implementation team have been chosen, and once their mission and role have been explained to them, it will be necessary to give them some initial exposure to the standard and to informa- tion security. There are a number of ways that this can be done. One is to send them on a Foundations of Information Security Management training course, which is a one-day seminar designed to inform and assist delegates who need a clear introduction to the principles and objectives of informa- tion security management. Such a course should be suitable as a general introduction to the subject for people who will not need to become too deeply involved in many of the details of the ISMS. Another, obviously, is to give them each a copy of this book; the first six chapters are probably the ones that will be most useful for the ‘lay’ members of the implementation team.
It is equally critical that all members of the working party understand clearly that their role is to put together and implement an ISMS that meets
IT GOVERNANCE64
the board’s requirement. The CEO needs to set this requirement clearly in front of the working party. There will undoubtedly be divergences of opin- ion between members of the team at many points during the implementation process and on a wide variety of issues. This should make for a stronger ISMS, as what emerges will be more likely to meet all the requirements of the organization. However, if the process is not managed effectively, this working party could also be the graveyard of the information security strat- egy.
When healthy disagreement degenerates to competition and open warfare, there will be little or no progress; if what emerges from the process is simply the view of one faction or another, it will not be successfully implemented.
Equally, it is possible for the working party to become bogged down in procedural issues or to be ultra-cautious in how it tackles the implementa- tion challenge. While the danger of the project dragging on can be dealt with by setting a very clear date by when implementation must be complete (even to the point of writing it into the individual performance objectives of all the members of the team), it can still fail because the working party simply does not work effectively. Clearly, therefore, the most important choice to be made in respect of both the implementation working party and the manage- ment forum into which it will evolve is that of its chairperson.
Chairperson
The choice of chairperson of this group is usually critical to its success, both as a group and in terms of how the rest of the organization views and responds to it. The chairperson needs, therefore, to be someone who is capa- ble of commanding the respect of all members of the working party. He or she needs to be wholly committed to achieving the goal of a certified ISMS within the board-agreed timetable. He or she needs to be pragmatic and prepared to ‘think outside the box’ in identifying solutions to organizational problems that are affecting implementation. This person should not be from any one of the organization’s support functions, as this will usually brand the project as an unimportant one. The project should on no account be led by an IT person, as the implementation of an ISMS simply cannot afford to be seen as only an IT project. The chairperson should, preferably, have a broad managerial responsibility within the organization as well as experi- ence in implementing cross-organizational change projects. Ideally, he or she will be the CEO or the main board director who has been charged with implementation of the board’s security policy. In smaller organizations, this
ORGANIZING INFORMATION SECURITY 65
person might also be the manager responsible for information security; in larger organizations, where this is likely to be a full-time role, the manager responsible for information security should properly report to the chairper- son of the forum. The need for segregation of duties needs also to be considered.
Not only is the structure outlined here the most effective method for delivery of the ISMS, but it is also very clear evidence of commitment from the very top of the organization to its implementation. The external ISO27001 auditor should be suitably impressed.
Records
Meetings should be scheduled ahead of time, to ensure that everyone who will be needed can record them in their diaries and be present. The frequency of meetings during the implementation phase will reflect the urgency and complexity of the implementation plan. In practical terms, meetings held fortnightly for the first few months of the implementation timetable can contribute to building momentum in it. After that, they can drop to monthly events. Once implementation is complete, the forum might meet on a quar- terly basis or when there are significant changes or business issues to consider. The forum should decide how often it needs to meet, set out its reasons and record the decision.
Meetings do not, of course, require physical attendance. They can take place by videoconference or by teleconference. What matters is that all members are able to take part, that they have adequate notice of the meeting and that the meetings are properly managed and documented.
Normal meeting principles should be established and maintained. All meetings should have an agenda and an attendance record, and action points and key decisions should be recorded in the minutes, with information about who is responsible for what actions and within what timescales. The minutes should be retained as part of the quality records, and the external auditor is likely to want to review them. In practical terms, the quality func- tion or PMO within the organization is usually best placed to provide the secretariat to this group.
While the external auditor will be particularly interested in what has been done about action points identified in the minutes, forum meetings can easily degenerate into long reviews of the minutes and actions arising from the previous meeting. Pragmatically, if the minutes are scheduled on the agenda to be dealt with at the end of the meeting, right before ‘any other
IT GOVERNANCE66
business’, meetings will be quicker and the organization will make substan- tially faster progress with the overall implementation. The chairperson should, prior to the meeting, have ensured that action points have been dealt with; this enables them to be reported on very quickly when the appropriate point on the agenda is reached.
As a matter of principle, one of the authors insists on starting meetings at the scheduled time, irrespective of how many people are in the room, and refuses to sum up progress so far for late arrivals. In the long (and some- times the short) run, everyone learns to arrive on time.
Allocation of information security responsibilities
ISO27001, at control A.6.1.1, says that ‘all information security responsi- bilities shall be clearly defined’. While the information security policy may provide general guidance as to who is responsible for which information security risk, this guidance is likely to be very broad, particularly if the policy model suggested in this book is adopted. It will not necessarily be clear to individual employees, from the policy statement, what their specific responsibilities will be. In any case, the organization will need to define clearly who is responsible for which risks, which security process and/or information asset and may have to look at geographic or site responsibilities as well.
For instance, while the need for an information security manager is clear, it is nevertheless sensible to identify individual owners of information secu- rity assets throughout the organization and confirm to them in detail and in writing their responsibilities in respect of these assets. This is an incredibly effective way of ensuring that the security of individual information assets is properly maintained on a day-to-day basis. Clause 8.1.2 (Ownership of Assets) of ISO27002 provides more information on this issue but does not add significantly to what we have said here.
There are generic responsibilities for members of particular groups of staff. The responsibilities of the members of the forum have been discussed, as have those of the information security manager. Those mentioned below could provide the basis for defining individual responsibilities within the organization and should be drawn more specifically to reflect the organiza- tional structure and systems.
IT departments should be accountable for the overall security of the system(s) for which they are responsible. This includes threat identification, assessing risks, managing projects, reviews and reporting on activity. Server room security should be another of their responsibilities.
ORGANIZING INFORMATION SECURITY 67
Local system administrators will have specific responsibilities for user registration and deletion, system monitoring, preparing security procedures, managing change control with defined boundaries and handling data back- up, designing application security, implementing internal controls and testing contingency and fall-back plans.
System managers should be responsible, at the system level, for threat identification, assessing risks, implementing selected security controls, securely configuring the system(s), setting up the user ID and password system, setting up system security monitoring, implementing change control and setting up all necessary security procedures and maintaining and testing business continuity plans.
Network managers should be responsible (at the individual domain or independent network level) for network perimeter threat identification, assessing risks, implementing selected network security controls (including firewalls), securely (designing and) configuring the network, setting up secu- rity monitoring, implementing change control, setting up security procedures and maintaining and testing network recovery plans.
Site managers should be responsible, in respect of the physical site for which they are the nominated manager, for threat identification, assessing risks, implementing selected physical controls (including perimeter controls), fire detection and response, utility services and their back-up, delivery and dispatch controls, and maintaining and testing the site’s business continuity plan. For the purposes of the ISMS, every site from which the organization operates should have at least one site manager. Where the site is a large and complex one, perhaps including a number of organizations or divisions of organizations, then a number of site managers may be required. A method of coordinating their activity will then be necessary. Clearly, the site manag- er’s responsibilities would normally be combined with a number of other line management responsibilities.
IT users throughout the organization should be required to be aware of and follow the organization’s security policy and procedures, maintain the clear desk policy and other physical security procedures, follow the pass- word and access control procedures, back up data (which is particularly important for notebook and mobile users) and comply with requirements in respect of social media and report security incidents.
Third parties should be required to comply with their contractual respon- sibilities. They should also be aware of the host organization’s security procedures and practices.
The identification of these individual responsibilities will be done throughout the process of pulling together the detailed information security
IT GOVERNANCE68
procedures; it is important for the forum members and the information security manager to be aware from the outset that this will be a key compo- nent of the drafting process for every procedure. It would be as well to adopt, at the outset, a standard template for the drafting of processes or procedures that includes headings such as ‘scope’, ‘purpose’, ‘process or procedure owner’, ‘individuals or roles identified as having responsibilities under this document’, ‘date for review (if any)’. These are in addition to the parameters required to effect suitable document control and confidentiality or availability status. There may be other items worth adding to such a template; the purpose is to ensure that all the key components are system- atically included in each new document.
Specialist information security advice
ISO27001:2013 does not have a specific requirement for an organization to deploy a specialist information security adviser. The reality, however, is that specialist advice may, at least, be necessary.
The organization may need advice from in-house or specialist external security advisers. While ISO27002 no longer provides detailed guidance on this issue, our view is that, while not all organizations will wish to employ their own specialist internal adviser and may prefer that a non-specialist internal adviser is given the security management responsibility, this person should have access to external advice (perhaps through a mentoring scheme or other support contract) that provides specialist input covering any areas in which the in-house person is deficient. It is particularly important that, in the areas of security technology and information technology generally, specialist advice is retained and is easily available. Technology, vulnerabili- ties, threats and defences are evolving so fast that it is difficult for any single individual to keep completely on top of them all.
While there is a discussion in Chapter 8 of this book about information security education and training, particularly for the users of information security facilities, it is at this point appropriate to look at the qualifications that might be appropriate for an in-house specialist adviser or that one might expect to be evidenced by an external specialist.
Bear in mind, while considering this issue, the requirement at clause 7.2 of the standard, that the organization must determine its requirements in terms of the competence necessary to perform tasks associated with infor- mation security, ensure that it is has those competences available, and that it keeps records to prove it.
ORGANIZING INFORMATION SECURITY 69
One option is for the organization to employ someone to provide the required specialist information and security advice who appears to be qual- ified by experience. However, it can be difficult for an inexperienced recruiter to identify someone who is really adequately experienced for this role. As correct selection of this person is critical to the early success of the ISO27001 project, it is worth taking a structured approach to resolving the issue.
It is recommended that any organization pursuing ISO27001 specifies from the outset that its information security adviser be appropriately quali- fied and that if someone who does not have a formal qualification but claims to be qualified through experience is recruited for the role, he or she be required (as a condition of continuing in employment beyond the initial probationary period) to demonstrate this competence by acquiring an appropriate qualification.
It is now possible to obtain a postgraduate qualification in information security management from the UK’s Open University. This course, numbered M886, is designed to help employees understand, create and manage both strategic and operational aspects of information security and it uses this book as its core textbook. We believe that this course is unique.
The International Board for IT Governance Qualifications (www.ibitgq. org (archived at https://perma.cc/XS5A-53RW)) has developed a range of ISO27001-focused certified training courses. These include a certified Lead Implementer and a certified Lead Auditor course. IBITGQ-accredited train- ing organizations are authorized to deliver training courses that prepare individuals for the externally set and monitored examination that leads to these certifications. Those who have attended these courses will all have a good understanding of key ISO27001 issues:
●● information security management concepts (confidentiality, integrity, availability, vulnerability, threats, risks and countermeasures, etc);
●● current legislation and regulations that have an impact on information security management in the United Kingdom (or in the jurisdiction in which the course is delivered, as appropriate);
●● current national and international standards, frameworks and organizations that facilitate the management of information security;
●● the current business and technical environments in which information security management takes place – security products, malicious software (malware), relevant technology, etc;
●● the categorization, operation and effectiveness of a variety of safeguards.
IT GOVERNANCE70
The British Computer Society (BCS), based in Swindon (www.bcs.org (archived at https://perma.cc/BQS6-994U)) is another link for any organiza- tion pursuing ISO27001. The BCS website describes a range of training programmes and regimes that are applicable to information professionals. More helpfully, it also describes the Information Systems Examination Board (ISEB) qualifications. The ISEB Certificate in Information Security Management Principles (CISMP) is designed to provide a foundation of knowledge for individuals who have security responsibility as part of their day-to-day role or who are likely to move into a security or security-related function.
Globally, there are now about 30 different vendor-neutral information security certificates, including those sponsored by ISACA and by the International Information Systems Security Certification Consortium (ISC 2). There is further discussion of training in Chapter 8.
The organization should, in appointing its information security adviser, pay as much attention to the quality of the individual as to his or her quali- fications and formal experience. The nature of information security threats is always changing, and the technology and context within which an organ- ization is maintaining its information are in constant flux. The information security adviser needs to be able to respond to new threats and find and protect vulnerabilities in new technologies that the organization wants to deploy to improve its competitive advantage. This requires a flexibility of thought allied to a depth of experience and a structured, balanced – and open-minded – approach to all the information security issues that the organization will encounter. Of course, high-quality people need appropri- ate compensation packages; this will be money well spent.
Segregation of duties
Another issue that has to be considered when setting up the ISMS is what the approach to segregation of duties should be. Control A.6.1.2 of ISO27002 provides for duty segregation, with the explicit objective of reducing the likelihood of misuse of organizational facilities or misappro- priation of organizational assets. The concept of segregation of duties is unlikely to be new to most readers of this book and the sensible approach is to extend the segregation rationale currently deployed within your internal control framework to cover your ICT activities as well. Key areas for consid- eration should include segregation between those who request user access
ORGANIZING INFORMATION SECURITY 71
rights and those who configure them; between those who do audits and those who are to be audited; those who update ISMS documentation and those who approve them for release; those who configure security controls (such as firewalls or IDS) and those test them – and between those who develop software and those who test or deploy it.
It should be noted that, although segregation of duties is available for selection as a control, it is not a specific requirement of the standard; the only requirement of the standard in this regard is in clause 9.2, which deals only with the requirement for internal audits to be impartial. The statement in the general introduction to the standard, that the ISMS should be scaled to the size of the organization is also relevant: smaller organizations will be much less able to segregate duties than larger ones.
Contact with special interest groups
As a practical matter, even where the organization recruits or appoints and trains a specialist security adviser, it is imperative that this person has access to specialist advice that covers the entire spectrum of information security.
It is equally imperative that there is a method of remaining current with changing issues in the information security environment. The environment and the threats within it change so rapidly that an organization systemati- cally has to keep on top of them. Your national CERT (Computer Emergency Response Team) or WARP (Warning, Advice and Reporting Point) are good starting points. The most important site for a Microsoft network is, of course, www.microsoft.com (archived at https://perma.cc/GX4A-BB7A). This carries a host of critical and relevant information, as well as updates and downloads, and should be consulted on a regular basis. The two most critical parts of the Microsoft site, from a security perspective, are the Safety & Security Centre (www.microsoft.com/en-gb/security (archived at https:// perma.cc/YY9A-6W65)) and Microsoft technet (https://technet.microsoft. com/en-gb (archived at https://perma.cc/PN7T-F4KH)). Every information security adviser should ensure that Microsoft best practice is integrated (where appropriate) into the organization’s ISMS.
There are a number of sources of regular information on information security issues. One is the information services available from this book’s website; it has a governance bias and is designed to be complementary to this book and to the range of information and support services provided by IT Governance Ltd. Other specific information security magazines worth
IT GOVERNANCE72
investigating are: SC Magazine – available online and offline, with editions for the United Kingdom, the United States and Asia Pacific, with a website at www.scmagazine.com (archived at https://perma.cc/BQS6-994U); and Infosecurity Today Magazine – website: www.infosecurity-magazine.com (archived at https://perma.cc/ZP6A-4BWB). We believe their subscription cost offers clear value for money.
There are also online services and information security websites. One online service worth exploring is https://searchsecurity.techtarget.com (archived at https://perma.cc/5SP8-ECWB), which provides a wide range of relevant, up-to-date information security advice.
Another critical website for the information security adviser is the site of the Computer Security Resource Center (US National Institute of Standards and Technology): https://csrc.nist.gov (archived at https://perma.cc/Z5WL- 42XB). This site is an excellent information centre resource for information security professionals; in particular, it carries substantial quantities of tech- nical and security information on most issues that will be of interest in setting up a certifiable ISMS.
Attendance at industry exhibitions, such as RSA and Infosec, should also be a standard part of the role. The major annual UK exhibition is Infosec, and details of exhibitions can be obtained through www.infosecurityeurope. com (archived at https://perma.cc/38HY-438C). These shows have a wide range of current products available for review, as well as a series of seminars and addresses on current and upcoming security issues.
Each of these sources of information should supplement regular visits to the Microsoft website as well as those of providers of any other chosen and installed corporate software, including particularly the providers of the chosen firewall and antivirus software. These sites will usually be the first places that identify specific threats to their software and propose solutions. The information security specialist should follow all these information sources on a regular basis and act immediately a new threat or vulnerability is identified. Sometimes the newspapers can identify threats as fast as any other organization; no source of information should be ignored!
There are two straightforward ways of identifying what local or national networks of specialists there might be. The first is by joining the local chap- ters of relevant professional organizations such as ISACA or ISC2. The second is through the ISO27001 auditor assigned to the organization by the company chosen to provide third-party certification of the ISMS against the standard. Asking the auditor for referrals and contacts is a completely sensi- ble thing to do; the auditor ought to be extremely well linked, and if he or
ORGANIZING INFORMATION SECURITY 73
she is not, then the expertise and current awareness of the auditor, and therefore his or her competence to do an adequate auditing job for the organization, ought to be questioned.
Contact with authorities
ISO27001 says, at control A.6.1.3, that ‘appropriate contacts’ should be maintained with ‘relevant authorities’ (law enforcement bodies, fire depart- ments, supervisory or regulatory bodies, ISPs and telecommunications operators) and with ‘special interest groups and other specialist security forums and professional associations (eg sources of specialist advice)’. Neither the standard nor ISO27002 sets out what would constitute ‘appro- priate contacts’; the latter does, however, set out clearly the purpose in maintaining contacts with authorities, which is to enable the organization to take appropriate action quickly, or to obtain appropriate advice, should events (security incidents) require it.
To an extent, this will be considered further in Chapter 26, which deals with business continuity management. For the purposes of this chapter, though, the organization’s information security adviser (who should be consulted and involved in all information security incidents) should system- atically develop, over the first months in the role, a series of contacts with the local police and, through them, with specialist digital forensics consult- ants, penetration testers, and the nearest police specialist ‘cybercrime’ unit (if one exists). The information security adviser should also develop contacts with the organization’s contracted providers of information and telecom- munications services, and, in particular, with those members of their staff who are responsible for dealing with information security issues, and with local or national networks of information security specialists.
Information security in project management
Control 6.1.5 deals, as the title suggests, with information security in project management. This control can apply to all projects, not just IT or informa- tion security projects, from a minor IT implementation through to a major business change project. Information security should be part of ‘business as usual’ and, therefore, information security risks and objectives should be considered at the outset of each project; where appropriate, a risk
IT GOVERNANCE74
assessment is conducted and specific controls selected and implemented to ensure the organization’s information security objectives are not compro- mised during, or as a consequence of, the project.
Independent review of information security
Control 18.2.1 says the organization should have its implementation of its information security policy independently reviewed. ISO27002 makes it clear that this can include bringing in outside auditors to review the ISMS or bringing in independent third-party certification auditors to certify it; the accredited certification audit meets this control requirement of the standard.
It does, however, recognize (as does any quality management system) that an organization ought to have its implementation of any key system or process reviewed by someone other than the person responsible for imple- menting it. This is a standard principle of an ISO9001-certificated management system, and any company that has such a management system in place can simply graft an extra responsibility on to those who have the existing ones.
An internal audit function that only has experience in financial audit will not, however, be adequately trained to carry out a quality management system audit. Equally, an audit function that already deals with internal audit of another management system will not be automatically capable of competently conducting an ISO27001 audit.
There is an IBITGQ Internal Audit qualification, and most third-party certification bodies are likely to provide training courses for internal audit teams. Quality system auditing is a necessary basis for ISMS auditing, but is not sufficient. At the very least, the internal auditor should attend a Foundations of Information Security Management course described earlier in this chapter – a one-day seminar for delegates who need a clear introduc- tion to the principles and objectives of information security management. Specific ISO27001 internal auditor courses are available, which are designed to ensure that those internal staff who are taking on an ISMS audit role will have the skills and knowledge they need. Ideally, the organization will have access to an appropriately qualified ISO27001 ISMS Lead Auditor, who can plan and oversee the entire internal audit process, and have an internal audit team that can be deployed to conduct the audits. The IBITGQ (identified earlier in this chapter) has both lead auditor and internal auditor qualifica- tions. Further information on relevant training courses can be accessed
ORGANIZING INFORMATION SECURITY 75
through https://www.itgovernance.co.uk/iso27001-information-security-training (archived at https://perma.cc/L7HP-GBH4).
Summary
The organization should put in place, from the outset, the management framework required by the standard and make it responsible for implemen- tation of the board’s information security policy. Initial training of the key people, particularly the specialist information security adviser, is important and worth investing time and money in before starting the process of imple- mentation. Once the groundwork is laid, progress can be quick.
5
Information security policy and scope
Once the information security management structure has been thought through, the initial ISMS establishment issues have been completely under- stood and the initial training of the key personnel who will be involved in the development of the policy has been put in place, the first and second steps in the Plan phase can be carried through.
Context of the organization
The Standard requires (at 4.1 and 4.2, respectively) that the context of the organization, as well as the requirements of interested parties, be identified (and preferably documented) as a preliminary step to determining both the scope of the ISMS and its overarching policy. This requirement simply forces the organization to consider, from the outset, all those factors which will determine the scope and focus of the ISMS.
ISO27000 defines ‘external context’ as being, in effect, any of the external factors that the organization has to take into account in creating its business plan and determining information security objectives; these can include sectoral characteristics; business, economic, technological, competitive and other, wider trends (on any geographic level) as well as the perceptions and requirements of stakeholders and regulatory bodies. ‘Internal context’ includes any of the aspects or characteristics of the organization that should be taken into account in designing the ISMS. These could include business model; governance structure, roles and accountabilities; organizational culture, capabilities and attitudes; existing policies, strategies, architectures and frameworks; and existing contractual relationships. Internal and external
IT GOVERNANCE78
context should be thoroughly documented. In particular, the needs and requirements of interested parties – legal, regulatory and contractual – should all be listed, preferably in a comprehensive database which enables you to describe exactly how those various information security require- ments are met within your ISMS. (See also Chapter 26 on compliance.) This step enables you to determine your baseline security criteria: the specific set of security controls that must be implemented in order to meet existing busi- ness (eg IPR protection), regulatory (eg DPA) or contractual (eg PCI DSS) requirements.
Information security policy
The information security policy is the founding document of the ISMS. It should set out top management’s vision for information security in the light of key strategic business objectives and reflect the key limitations and oppor- tunities that determine the scope of management’s ambition for the ISMS. Clause 5.2 of the standard (and control A.5.1) contains the basic require- ment. Creation of an information security policy is, however, not always as straightforward as it seems. It may be an iterative process (particularly in complex organizations dealing with complex information security issues and/or multiple domains), and the final form of security policy that is adopted may therefore have to reflect the final risk assessment that has been carried out and the statement of applicability that emerges from that.
Clause 5.2 sets out the requirements for the ISMS policy. The scope of the ISMS, and therefore the policy itself, must take into account the character- istics of the business, its organization, location, assets and technology. The policy must include or reference a framework for setting information secu- rity objectives and establish the overall sense of direction. It must take into account all relevant business, legal, regulatory and contractual security requirements. It must establish the strategic context (for both organization and risk management) within which the ISMS will operate. It must establish criteria for the evaluation of risk and the structure of the risk assessment. Of course, top management must approve it.
The security policy will also have to be regularly reviewed and updated in the light of changing circumstances, environment and experience. As a minimum, if there is no earlier reason for the board to review its policy, it should be reviewed annually and the board should agree that the policy remains appropriate (or otherwise) to its needs in the light of any changes to the business context, to the risk assessment criteria or in the identified risks.
INFORMATION SECURITY POLICY AND SCOPE 79
Initially, the information security policy is a short statement (we think organizations should aim for it to fit a maximum of two pages of A4) that is designed to set out clearly the strategic aims and objectives that will guide the development of the ISMS. The policy may go through a number of stages of development, particularly in the light of the risk assessment, but the final version must satisfy clause 5.2 of the standard and should appropriately reflect the good practice that is set out in clause 5 of ISO27002. Proof that the policy has been approved by top management, has been published and communicated internally and is reviewed regularly (usually annually, as a minimum), with any changes similarly published and communicated, will enable the organization to satisfy this requirement of the standard.
The key questions for the initial policy statement to succinctly answer are:
●● Who?
●● Where?
●● What?
●● Why?
Usually, the manager who has been charged with leading the implementa- tion of the ISMS will be charged with drafting a security policy and board paper that proposes how these questions should be answered. This paper should seek to be as objective as possible in working through the possible answers to these four questions so that the board can identify and focus on those issues that require clarification or where difficult decisions may be necessary.
A copy of that section of the minutes (preferably signed off by the chair- person as a correct copy) of the board meeting in which the security policy was debated and adopted should be filed with the security policy documen- tation. It can be a controlled record and it does, for audit purposes, provide useful and immediate evidence of the process by which the policy was adopted, and of any amendments to it. This, together with the proposal that was put to the board, is the first part of the evidence that top management have met the requirements of clause 5.1 in terms of committing to the crea- tion of an ISMS whose objectives are compatible with the strategic aims of the organization.
The policy itself should then be issued as a controlled document and made available to all who are doing work within its scope; copies could be posted on all internal noticeboards, both the physical and electronic ones. There are other methods of communication; what matters is that the
IT GOVERNANCE80
communication is effective. These copies of the policy document should of course be clearly marked as controlled copies, to ensure that they are updated to reflect any changes that take place. Copies handed out as part of training or awareness seminars, or to third parties, should be marked as uncontrolled copies.
Who?
‘Top management’ has to be completely behind and committed to the ISMS; therefore, the policy statement must be issued under their authority and there should be clear evidence, in the form of written minutes, that the policy was debated and agreed both by the board as a whole and by any separate management steering group. Any revisions to the policy should also be debated and agreed by both the board and the steering group.
From a practical point of view, it is worth keeping the policy statement as simple, as comprehensive, as principled and as strategic as possible so as to allow managers adequate freedom to respond to changing business and security circumstances in implementing it without needing to return to the board and the forum for the policy itself to be freshly agreed.
It will also require participation by all employees in the organization and should reflect the needs of customers, suppliers, shareholders and other third parties. This is part of the context of the ISMS referred to earlier. In thinking through the security policy, the board and the forum will need to consider what impact it will have on these constituents and/or audiences and the benefits and disadvantages that the business will experience as a result of this.
Where? (scope of the policy and the ISMS)
Those parts of the organization within which the policy is going to apply need to be clearly identified. The standard is explicit that the scope must be determined once the context of the organization (internal and external issues) and the requirements of interested parties have been established. This may be done on the basis of corporate, divisional or management structure, or on the basis of geographic location. There should be logical access to all assets within scope, and consideration given to occurrences of those assets at other sites. In other words, the dependencies and interfaces of the assets within scope will need to be made clear within the scope statement. In larger, more complex organizations, network maps, organization charts, business architecture diagrams and information flow charts may be useful tools for
INFORMATION SECURITY POLICY AND SCOPE 81
clarifying possible scope statements. ISO27003 says that, as part of the scoping exercise, the assets on which the key business processes depend should be identified, their ownership clarified and their security require- ments analysed.
A virtual organization, a cloud-based business or a dispersed, multi-site operation, may each have security issues different from those that affect one located on a single site. In practical terms, a security policy that encom- passes all of the activities within a specific entity for which a specific board of directors or ‘top management’ team is responsible is more easily imple- mented than one that is to be applied to only part of the entity. It is important to ensure that the management team that is implementing the policy does actually have adequate control over the operations contained within scope and that it will be able to give a clear mandate to implement the security policy within that scope. The section in Chapter 6 ‘Identify the boundaries’ should also be read at this point, particularly as the ISMS is required to be considered within the overall organizational context.
It is critical, if there are aspects of the organization’s activities or systems that are to be excluded from the requirements of the security policy, that these are clearly identified – and explained – at this stage. Multi-site or virtual organizations will need to consider carefully the different business requirements of their different sites and the security implications of them. There should be clear boundaries (‘defined in terms of the characteristics of the organization, its location, assets and technology’) within which the security policy and ISMS will apply. Any exclusions should be openly debated by the board and the steering group, and the minutes should set out how and why the decision was taken. It is possible that, in fact, divisions of the organization, components of the information system or specific assets will not be able to be excluded from the scope, either because they are already integral to it, or because their exclusion might compromise a depend- ent business process or undermine the information security objectives themselves. It must therefore be clear that any exclusions do not in any way compromise key business processes or undermine the security of the organi- zation to be assessed.
This is particularly important where outsourced processes are concerned. Outsourced processes (but not the organizations to which they are outsourced) should be included in the ISMS scope and subject to appropri- ate controls. This is sensible. You need assurance that your key business processes – even if operated by third parties – are still operated within your risk tolerance.
IT GOVERNANCE82
Auditors will be assessing how the management team applies its policy across the whole of the organization that is defined as being within the scope of the policy and should be expected to test to their limits the boundaries of the stated scope to ensure that all dependencies and interfaces with security- related processes have been identified and adequately dealt with.
In reality, as stated earlier, the process of designing and implementing an effective ISMS may be made simpler by including the entire organization for which the board has responsibility. Even so, there will still need to be deci- sions about client and supplier access as well as any disaster recovery site. Access to information assets within the scope (for example, data hosted on a server that is within scope) from a geographically remote site will have an effect on the arrangements for maintaining the confidentiality, integrity and/ or availability of that data, and so in one way or another will be a concern of the ISMS. These issues all need to be addressed through the scope state- ment and the risk assessment.
There is an argument, in large, complex organizations, for a phased approach to implementation. Where it really is possible to define adequately a subsidiary part of the organization, such that its information security needs can be independently assessed, it may be possible to gain substantial experience in designing and implementing an ISMS, as well as a track record of success and the momentum that accompanies it, such that a subsequent roll-out to the rest of the organization can be carried through successfully and smoothly. These considerations apply to any large, complex project, and the appropriate answer depends very much on individual organizational circumstances.
It would certainly be a mistake to define the scope too narrowly. While it may appear, on the surface, to be a quick and easy route to certification, it is in fact a route to a worthless certificate. Any external party assessing the organization’s ISMS will want to be sure that all the critical functions that may affect its relationship, and the information about which it is concerned, are included, and limiting the scope will compromise this objective.
The overall issue of scoping is certainly one where experienced, profes- sional support can be helpful in assessing the best way forward.
What?
The statement that the top management ‘is committed to preserving the confidentiality, integrity and availability of information’ is at the heart of a security policy and an ISMS. It is important to define precisely the key terms
INFORMATION SECURITY POLICY AND SCOPE 83
used in the policy, and we recommend that the definitions contained in ISO27000 are used. For ISMS purposes, ‘information’ should be very widely defined:
Information [can be] printed or written on paper, stored electronically,
transmitted by post or using electronic means, shown on films, [or] spoken in
conversation.
In other words, appropriate protection is required for all forms of information:
Confidentiality [is defined as] information not made available or disclosed to unauthorized individuals, entities or processes.
Integrity [is defined as] the property of accuracy and completeness.
Availability [is defined as] being accessible and usable upon demand by an authorized entity.
Availability is particularly important to cloud-based businesses, or those engaged in e-commerce or social media. A business that depends for its very existence on the availability of its website, but that fails to take adequate steps to ensure that the site is up, running and running properly at all times, is likely to fail as a business much more quickly than a traditional bricks- and-mortar business that is unable to open its shop doors for a few days.
Members of the board, the management team and the staff of the organ- ization should all understand that these are the definitions of these words, and they should be prominently described and set out in the early briefings to staff and in internal communications. Auditors from certification bodies are likely to check (probably randomly) that staff understand what these words mean, and while they will not look for staff to remember these defini- tions verbatim, they will want staff to demonstrate practical understanding of how the pursuit of these aspects of information security is likely to have an impact on their own work. This level of understanding is required, as a minimum, so that each member of staff is able to recognize and react appro- priately to a security incident. Information security incident management is covered in Chapter 24.
There is also the point at which the organization needs to determine its criteria for accepting risks and to identify the levels of risk it will accept. It is a truism to point out that there is a relationship between the levels of risk and reward in any business. Most businesses, particularly those subject to FRC Risk Guidance and similar standards, will want to be very clear about
IT GOVERNANCE84
which risks they will accept and which they won’t, the extent to which they will accept risks and how they wish to control them. The management team needs to specify its approach, in general and in particular, so that the busi- ness can be managed within that context.
Risk assessment is discussed further in Chapter 6.
Why?
Information security, broadly speaking, may be defined as: ‘the protection of information from a wide range of threats in order to ensure business conti- nuity, minimize business damage and maximize return on investments and business opportunities’ and is also ‘essential to maintain competitive edge, cash-flow, profitability, legal compliance and commercial image’. The initial staff communication process should set out clearly the nature of the threats faced by the organization and the possible costs, in both financial and non- financial terms, of information security breaches. The information provided in this book can be used for that purpose, but, wherever possible, local and/ or industry-specific information should be sought and used, as this gives immediacy and currency to the possible threats. Illustrations of the possible consequences to the organization itself should be developed in order to help all those involved to fully appreciate the need for the ISMS.
The ‘where’ and the ‘what’ answers above form the basis of the statement of the scope of the ISMS. There is a further, and more detailed, discussion of some of the issues related to scoping the ISMS in the next chapter, in the context of risk assessments. There should be a single document that identi- fies the internal and external context as well as the requirements of interested parties and, in that light, sets out clearly the organization(s) that fall within the scope of the policy, which locations, which assets and which techno- logies. This statement of policy is an essential initial document, which not only helps focus the development of the ISMS but also makes clear to all concerned the seriousness of their responsibilities. It may be sensible, at this stage, to divide the organization into separate security domains. A ‘domain’ is a discrete logical or physical area of an organization or network that is the subject of security controls designed to protect it from outside access. A domain should be capable of representation on a diagrammatic map. An organization or a network may be made up of one or a number of domains.
INFORMATION SECURITY POLICY AND SCOPE 85
A policy statement
The initial policy statement might, therefore, read as follows:
The board and management of organization Y, which operates in sector Z
(or is in the business of Z, etc), located in …, are committed to preserving
the confidentiality, integrity and availability of all the information assets
throughout their organization in order to maintain its competitive edge,
cash-flow, profitability, legal and contractual compliance and commercial
image. Information and information security requirements will continue to be
aligned with organizational goals, and the ISMS is intended to be an enabling
mechanism for information sharing for electronic operations, for e-commerce
and for reducing information-related risks to acceptable levels. All employees of
the organization are required to comply with this policy and with the ISMS that
implements this policy. Certain third parties, as defined in the ISMS, will also be
required to comply with it. This policy will be reviewed when necessary and at
least annually.
In addition, the policy should cover the following areas:
• It should announce that a top-level management steering group will be
established to support the ISMS framework and periodically review the
security policy.
• It should outline the approach to risk management, the criteria against which
risk will be evaluated, the structure of the risk assessment and who will be
responsible for it.
• It could briefly identify specific policy requirements, such as access policy,
malware stance, mobile working, back-up and roll-over, and security incident
reporting.
• It should contain a commitment to meet other information security or
compliance requirements, whether business, regulatory (eg data protection
acts), statutory (eg corporate legislation) or contractual (eg PCI DSS).
• There should be a clear statement of the requirement that information
security continue to be aligned to specific business goals and contain
a framework for setting information security objectives across the
organization.
• It could explain that all staff will receive security awareness training and
specialized staff will receive more specialized training.
• It could formally state the commitment to comply with, and achieve and
maintain accredited certification to, ISO27001.
IT GOVERNANCE86
It must state that the ISMS is subject to continual improvement. Such a statement would be sufficiently general to cover all the key compo-
nents of information security for organization Y for the foreseeable future, but sufficiently precise and clear to be effective as a policy statement. It should clearly be approved by the management information security forum and signed by the most senior person in the organization (the chairperson, president, CEO, director-general, etc). A template for an information secu- rity policy is included in the ISO27001 ISMS Documentation Toolkit.
The security policy statement can be expanded, in the light of the risk assessment, to take into account the further guidance of clause 5.1 of ISO27002. The policy statement proposed here does, however, meet the requirements of clause 5.2 of ISO27001.
Costs and the monitoring of progress
Any sensible board or management team will, at this stage, also require an estimate of the costs and resources involved in implementing the ISMS, an assessment and quantification of the potential benefits, and an outline imple- mentation plan that describes, at the top level, who will be responsible for doing what and by when. Such a document should be prepared and presented to the board along with the proposed security policy. This document should set out clearly the proposed dates at which the board will be invited to review progress towards final implementation so that it can ensure that its policy is being properly implemented.
As all organizations have their own preferred formats for doing this, this book does not set out how to do it. It only argues that review dates should be realistically spaced and that the plans it approves should allow executive managers sufficient flexibility in implementing a policy that will have to be designed in the light of facts that are not known at the point at which the policy is adopted.
It is suggested that the key points at which progress might be reviewed are:
1 After completion of the risk assessment; the full range of risks to be managed will have been identified.
2 After completion of a draft statement of applicability (SoA). Any costs incurred prior to this should be minimal, but until the SoA defines what
INFORMATION SECURITY POLICY AND SCOPE 87
needs to be done, it will not be possible to budget effectively for the implementation.
3 After implementation of the initial suite of procedures that apply the identified controls.
4 After completion of the first cycle of system audits and reviews in accordance with clause 9.2 of the standard and prior to the initial visit by the certification body.
5 Annually, as part of the regular review of the ISMS, to ensure that the budget is being correctly applied and that any new technology issues, threats or vulnerabilities have been taken care of.
It is assumed that the organization will already have well-developed proce- dures for dealing with projects that are missing key review dates and in which there is overspending or underperformance. The IT Governance website has resources and guidance on effective project governance, and this book will not, therefore, make any proposals about what action should be taken to rectify any shortfalls, but will make the observation that early and vigorous action by the board to ensure that there is compliance with its requirement to design and implement an information security policy and management system will go a long way to proving to the organization the seriousness of the endeavour and thus to bringing about its achievement.
6
The risk assessment and Statement of Applicability
Establishing security requirements
An earlier version of ISO27001 identified three sources for establishing the organization’s information security requirements: the risks that the organi- zation faces (business, risks, discussed further below); the risks arising from the compliance and contractual requirements imposed on the organization in each of the jurisdictions in which it operates (compliance requirements in particular are discussed in Chapter 26); and the ‘particular set of principles, objectives and business requirements for information processing that an organization has developed to support its operations’, which are the conse- quence of the IT architecture the organization has previously established to support its business model.
Risks, impacts and risk management
All organizations face risks of one sort or another on a daily basis. Risk management is a discipline that exists to deal with non-speculative risks – those risks from which only a loss can occur. In other words, speculative risks, those from which either a profit or a loss can occur, are the subject of the organization’s business strategy whereas non-speculative risks, which can reduce the value of the assets with which the organization undertakes its speculative activity, are (usually) the subject of a risk management plan (in ISO27001, a ‘risk treatment plan’). These are sometimes called permanent and ‘pure’ risks, in order to differentiate them from the crisis and speculative types.
IT GOVERNANCE90
Risk management plans usually have the following linked objectives, which are:
●● to eliminate risks;
●● to reduce to ‘acceptable’ levels the risks that cannot be eliminated;
●● to deal with the risks at ‘acceptable’ levels, in one of the following ways:
– living with them, exercising carefully the controls that keep them ‘acceptable’;
– transferring them, by means of insurance, to some other organization;
– committing to a plan to reduce the risk to an acceptable level within a defined time frame.
Pure, permanent risks are usually identifiable in economic terms; they have a financially measurable potential impact upon the assets of the organiza- tion. The requirements of Sarbanes–Oxley, COSO, the FRC Risk Guidance and, for financial sector organizations, the Basel 2/3 Frameworks have raised risk management – and, in particular, operational risk management – to a core function in most large organizations.
Risk acceptance criteria
Risk management strategies are usually based on an assessment of the economic benefits that the organization can derive from an investment in a particular control; in other words, for every control that the organization might implement, the calculation would be that the cost of implementation would be outweighed, preferably significantly, by the economic benefits that derive from, or economic losses that are avoided as a result of, its implemen- tation. ‘Risk appetite’ is the phrase used to describe managers’ level of preparedness to take risks. The capacity of the organization to absorb loss will be one of the key determinants of risk appetite. The organization uses risk acceptance criteria for determining which risks it will take and which ones it will reject. Alternatively, it could apply controls to reduce risks to a level that it can tolerate.
The organization should define its criteria for accepting risks (for exam- ple, it might say that it will accept any risk that has an economic impact less than the cost of controlling it) and for controlling risks (for example, it might say that any risk that has both a high likelihood and a high impact must be controlled to an identified level, or threshold).
THE RISK ASSESSMENT AND STATEMENT OF APPLICABILITY 91
Before we turn to a detailed consideration of the risk assessment process, we have to recognize that most organizations will already have made a number of decisions about risks (they have, after all, been in business for a time, dealing with threats and vulnerabilities for real) and will also have implemented a number of controls in order to comply with statutory, regu- latory or contractual requirements. The organization will need to decide how it incorporates these existing controls into its ISMS and its risk assess- ment methodology.
The first, sensible step is simply to recognize, in your risk assessment methodology, that the requirements of interested parties (what we have called the ‘Baseline Security Criteria’ have led the organization to implement specific controls; identify the interested parties and their requirements as described in Chapter 5 (‘Context of the Organization’), and state that the related controls – called Baseline Security Controls – are incorporated as they are into the ISMS. You then have to determine how you handle all the other controls which are already in place, the ones that you adopted at some earlier point to meet specific security criteria at the time. You either review them, now, for adequacy and effectiveness, or you recognize their existence and simply accept them as part of your baseline security control set, focus- ing your risk assessment on those remaining risks which are not yet appropriately treated. For example, a door is a control but, in assessing the security of a room you recognize that the door is already in place, accept its adequacy as a control, and focus on other entry routes (‘attack vectors’).
For most organizations, the practical approach is to adopt the baseline security control approach and focus on remaining risks. Thereafter all controls, new and old, can be reviewed for effectiveness as part of the continual improvement programme.
Approach to risk assessment
Approaches to enterprise risk management provide the backdrop against which the requirements of IT governance and ISO27001 should be consid- ered. ISO27001 requires a risk assessment to be undertaken. This is at the heart of the ISMS. Clause 6.1.2 of the standard requires the organization to ‘define and apply an information security risk assessment process’, which should be appropriate for the organization, its information security objec- tives and the identified business, legal and regulatory requirements (the baseline security criteria).
IT GOVERNANCE92
Although the standard identifies ISO31000 and ISO/IEC 27005 as providing useful guidance for risk assessment, the organization is in fact at liberty to deploy any appropriate risk assessment methodology that reflects its internal and external context and the requirements of its interested parties. The risk assessment methodology could – but does not need – to be asset-based. It must identify risks, risk owners and risk acceptance criteria, must analyse risks in terms of likelihood and consequence and, above all, must produce ‘consistent, valid and comparable results’.
ISO27001 allows flexibility in choice of risk assessment methodology both in order to simplify, for larger organizations, the process of integrating information security risk management with the enterprise-level risk manage- ment framework (eg ISO31000) already in place and, for organizations facing specific contractual or market requirements, customer and contrac- tual alignment.
There are a number of risk assessment methodologies – some asset-based, others scenario-based – which might be appropriate for use in an ISMS. We have drawn all those methodologies together into a single, comprehensive guide to risk management, called Information Security Risk Management for ISO27001/ISO27002 also by Alan Calder and Steve G Watkins (2019). This chapter focuses on the risk assessment methodology contained in ISO/ IEC 27005, as it is specifically designed for use within an ISO27001 ISMS.
Risk assessment is a systematic study of the probability and consequences of events, or, alternatively, the systematic and methodical consideration of: 1) the business harm likely to result from a range of business failures; and 2) the realistic likelihood of such failures occurring. Risk treatment (which, with risk assessment, makes up the two stages of risk management) might involve the selection of controls in order to reduce risk to an acceptable level.
The information security risk assessment must be a formal process. In other words, the process must be planned, and the input data (including how existing controls incorporated), their analysis and the results should all be recorded. ‘Formal’ does not mean that risk assessment tools must be used, although in many situations they are likely to turn a potentially diffi- cult and time-consuming task into one that can be completed in a meaningful timescale and to add significant value. Risk assessments must also produce ‘consistent, valid and comparable results’; this requirement (clause 6.1.2.b) tends to support the use of a purpose-developed risk assess- ment tool (like, for instance, vsRisk™), and a well-defined methodology.
THE RISK ASSESSMENT AND STATEMENT OF APPLICABILITY 93
The complexity of the risk assessment will depend on the complexity of the organization and of the risks under review. The techniques employed to carry it out should be consistent with this complexity and the level of assurance required by the board.
You should, at this point, extend your initial glossary of terms to in clude definitions (all of which should be sourced from ISO27000) of risk, risk analysis, risk assessment, risk evaluation, risk management and risk treatment.
Who conducts the information security risk assessment?
It is entirely up to the individual organization to choose who is to perform this risk assessment, and how. There are two issues to consider before decid- ing who will do it. The first is that there should be periodic reviews of security risks and related controls – taking account of new threats and vulnerabilities, assessing the impact of changes in the business, its goals or processes, technology and/or its external environment (such as legislation, regulation or society) and simply to confirm that controls remain effective and appropriate.
The second is that the standard requires the organization to identify the competences required of the people operating within the ISMS, including those involved in risk assessment. The need for an appropriately competent person was covered in some detail in Chapter 4. It is essential that risk assessment – the core competency of information security management – is conducted by an appropriately qualified and experienced person. This is logical; the key step on which the entire ISMS will be built needs, itself, to be solid. The ISO27001 auditor will therefore want to see documentary evidence of appropriate knowledge skills.
A number of organizations will already have a risk management function staffed by people with training that enables them to carry out risk assess- ments. The role of the risk management department is, usually, systematically to identify, evaluate and control potential losses to the organization that may result from things that have not yet happened. The skills and methodol- ogy of this department may or may not meet the organization’s requirements. Either way, there are potentially significant benefits for such an organization if its information security risk assessments can be carried out by the same function that handles all risk assessments. The benefits lie not just in cost- effectiveness but in the fact that such a risk management or risk control
IT GOVERNANCE94
department will have an existing and ongoing understanding of the busi- ness, its goals and environment, and an appreciation of all the risks faced by the business in the pursuit of its objectives. Equally, it should be able to assess how all the different risks, and the steps taken to mitigate them, may be related and coordinated.
Many organizations, however, do not already have an internal risk management function. There are then two possible ways to tackle risk assessment. The first is to hire an external consultant (or firm of consultants) to do it. The second is to train someone internally. The second is preferable in most cases, as the organization ‘shall perform information security risk assessments at planned intervals or when significant changes are proposed or occur’, and having the expertise in-house enables this to be done cost- effectively. Chapter 4 discusses how to recruit and/or train a specialist information security adviser, and if information security risks are the only ones being considered, then this would be an appropriate person to under- take the risk assessment.
In circumstances where the organization has existing arrangements with external suppliers for risk assessment services, or is in the process of setting up a risk management function or capability (in the context of responding to the requirements of an external risk management requirement, perhaps), then it should from the outset investigate ways in which its risk assessment processes can be integrated.
It is more difficult for a smaller business to retain specialist information security expertise in-house than for a larger one; the internal risk assessment role needs to be maintained over time and the person concerned needs to continue being trained and involved in risk assessment issues, both inside and outside the organization. The disadvantage of hiring external risk asses- sors, apart from the cost, is that the organization does not necessarily get continuity of involvement from a firm of assessors. The advantage of the external hire, apart from its being a variable cost, is that the external asses- sor should be up to date on relevant issues and should be wholly objective. A possible middle route is to contract on a multi-year basis, with an appro- priately trained individual or consultancy firm to provide risk assessment support and guidance as and when it is required. But however the organiza- tion chooses to acquire this resource, it is crucial that a lead risk assessor is in place and fully involved in the risk analysis and assessment process that the rest of this chapter describes.
There are software tools that have been designed to assist in risk assess- ment, but the use of them is not mandatory. It is essential, though, that the
THE RISK ASSESSMENT AND STATEMENT OF APPLICABILITY 95
risk assessment should be done methodically, systematically and compre- hensively, producing valid, consistent and comparable results; this means that the process should not be subjective or rely exclusively on the experi- ence and judgement of one or two information security professionals. An appropriate information security risk assessment tool, designed with ISO27001 in mind and kept up to date in terms of changing information security issues, can be effective in this process. vsRisk™, from Vigilant Software Ltd, is one such tool.
Security in any system should be commensurate with its risks. However, determining which security controls are appropriate and cost-effective can be a complex and subjective process. One of the prime functions of security risk analysis is to put this process on to a more objective basis. Most forms of risk analysis involve the use of risk analysis tools, specific to ISO27001, that are designed to ensure that the scope of the exercise is comprehensive and the process rigorous.
There are a number of different approaches to risk analysis. However, these essentially break down into two: quantitative and qualitative.
Quantitative risk analysis
This approach looks at two issues: the probability of an event occurring and the likely loss should it occur. A single figure is produced from these two elements, by simply multiplying the potential loss (measured in monetary terms) by its probability (measured as a percentage). This is sometimes called the annual loss expectancy (ALE) or the estimated annual cost (EAC). Clearly, the higher the number that an event or risk has, the more serious it is for the organization. It is then possible to rank events in order of risk (ALE) and to make decisions based upon this.
The problems with this type of risk analysis are usually associated with the unreliability and inaccuracy of the data. Probability is usually assessed subjectively and is rarely precise. In some cases, this approach can promote or reflect complacency about the real significance of particular risks. The monetary value (particularly of reputational damage) of the potential loss is also often assessed subjectively, and when the two components are multi- plied together, the answer is equally subjective. When quantitative analysis is done accurately, the time cost of that accuracy quite often outweighs the benefits the organization is able to derive from it.
In addition, controls and countermeasures often have to tackle a number of potential risk, and the risks themselves are frequently interrelated.
IT GOVERNANCE96
A detailed ranking in order of ALE can make it difficult to identify these interrelationships and lead to poor, cost-ineffective decisions about controls, and this approach is not, therefore, recommended. Nevertheless, we do recognize that a number of organizations have successfully adopted quanti- tative risk analysis.
Qualitative risk analysis
The qualitative approach is by far the more widely used approach to risk analysis and is the approach at the heart of ISO27005. Numeric probability data are not required, and only estimated potential loss is used. Most quali- tative risk analysis methodologies make use of a number of interrelated elements, and they are best laid out in tabular form in a corporate risk log, so that, for each asset, its owner(s), threat(s), vulnerabilities and impact(s) are identified.
ASSETS WITHIN THE SCOPE
The first step is to inventory all the information assets (and ‘assets’ includes processes, information, information systems, hardware, software, etc; control 8.1.1. of ISO27002) within the ISMS scope and, at the same time, document which role and/or department ‘owns’ the asset, as provided for in control 8.1.2. Although not mandated by ISO27001, asset-based risk assessment is the most sensible approach.
THREATS
Threats are things that can go wrong or that can ‘attack’ the identified assets. They can be either external or internal to your organization; they are always external to the asset. Examples might include fire or fraud; many such potential threats are described in Chapter 1. Threats are always present for every system or asset; because it is valuable to its owner, it will be valuable to someone else; if it is lost, it would have an impact. If you cannot identify a threat to an asset, you might assume that it is not really an asset.
VULNERABILITIES
Vulnerabilities leave a system, or asset, open to attack by something that is classified as a threat, or allow an attack to have some success or greater impact. For example, for the external threat of fire, a vulnerability could be the presence of flammable materials (eg paper) in the server room. In the language of the standard, a vulnerability (which can be an absence of or
THE RISK ASSESSMENT AND STATEMENT OF APPLICABILITY 97
weakness in a control) can be exploited by a threat. The baseline security criteria approach means that, when carrying out a risk assessment, you are looking at risks which exploit vulnerabilities that exist in spite of the controls that are already in place to meet contractual, regulatory and business requirements.
IMPACTS
The successful exploitation of a vulnerability by a threat will have an impact on the asset’s availability, confidentiality or integrity – in respect of all or one of the business, contractual or compliance requirements of the business. These impacts should all be identified and, wherever possible, assigned a relative value based on the cost to the organization of that attribute being compromised.
RISK ASSESSMENT
The risks then have to be assessed to identify the potential business harm that might result from each of them. There should then be an assessment of the likelihood of the threat exploiting the vulnerability to create the impact. This enables one to identify the level of risk (and, for smaller organizations, a low–medium–high classification is usually adequate), and this enables one to conclude, for each risk, whether it is acceptable or if, conversely, some form of control is required.
CONTROLS
Controls are the countermeasures for risks. Apart from knowingly accepting risks that fall within the criteria of acceptability, or transferring the risk (through contract or insurance) to others, the ISC2 Common Body of Knowledge (CBK) describes five types of control:
1 directive controls, which are generally administrative, such as creating policies;
2 preventive controls, which protect vulnerabilities and make an attack unsuccessful or reduce its impact;
3 detective controls, which discover attacks and trigger preventive or corrective controls;
4 corrective controls, which reduce the effect of an attack;
5 recovery controls, which are often associated with business continuity and disaster recovery.
IT GOVERNANCE98
We believe the first of these is actually a way of delivering the second, third and fourth and that the fifth is a subset of the fourth.
It is essential that any controls that are implemented are cost-effective. The principle should be that the cost of implementing and maintaining a control should be no greater than the potential (time-sensitive) cost of the impact. It is not possible to provide total security against every single risk, but it is possible to provide effective security against most risks. However, these can change, and so the process of reviewing and assessing risks and controls is an ongoing one.
The process for assessing risk builds on the scoping exercise discussed in Chapter 5 and should be focused on critical systems and information assets (at least initially; organizations can, if they wish, deal with non-critical systems and assets at a later date). It can be broken down into a number of clearly defined steps:
1 Identify the boundaries of what is to be protected (the scope).
2 Identify the assets: all the systems necessary for the key business processes of receiving, storage, manipulating and transmitting information within those boundaries and the information assets within those systems.
3 Identify the relationships between these systems, the information assets and the organizational objectives and tasks.
4 Identify criticality: identify those systems and information assets that are critical to the achievement of organizational objectives and tasks.
5 Identify the potential threats to those critical systems and assets.
6 Identify the potential vulnerabilities of those critical systems and assets.
Clearly, the combination of the likelihood of the threat exploiting the vulner- ability, when combined with the impact on the organization of the asset being compromised, enables the risks that relate to each of the assets to be identified. However, we will first explore each of the steps above in more detail.
Identify the boundaries
It is essential to decide the boundary within which protection is to be provided. The business environment and the internet are each so huge and diverse that it is necessary to draw a boundary between what is within the organization and what is without. In simple terms, boundaries are physi- cally or logically identifiable. Boundaries have to be identified in terms of
THE RISK ASSESSMENT AND STATEMENT OF APPLICABILITY 99
the organization, or part of the organization, that is to be protected, which networks and which data, and at which geographic locations.
Identifying boundaries within the Cloud is particularly difficult. The key concept to have in mind is that the scope of the ISMS cannot include elements which are outside the control of management. A Software as a Service (SaaS) product (eg Office365) is outside the organization’s control; Microsoft make decisions about how to secure it and their customers can take or leave the consequences. All the client can do is to decide whether or not, on the basis of Microsoft’s ISO27001 certification, to trust its data to their SaaS offering.
ISO/IEC 27018 provides an additional set of controls, complementary to those in ISO27002, which are specifically intended for use in Cloud environ- ments, where a data controller contracts with a cloud processor in relation to personally identifiable information (PII). This control set is more broadly useful in helping organizations address security issues in a distributed cloud environment. ISO/IEC 27017 provides an additional generic set of controls for cloud computing services.
Cyber Essentials
This is a useful point to identify the existence of the UK Cyber Essentials scheme. This is an accredited certification scheme that sets out minimum security controls that every organization of any size should adopt in order to protect itself from the majority of low-level but high-volume cyber attacks. Achievement and maintenance of Cyber Essentials certification could be seen as a baseline security control, at the cyber level of fitting doors and windows with working locks; it is increasingly a baseline requirement for contracting with the UK government. The Cyber Essentials scheme works well with ISO27001; read more about it at www.itgovernance.co.uk/ iso27001-and-the-cyber-essentials-scheme (archived at https://perma.cc/ T4G2-FCSB).
Scope was first mentioned in Chapter 5. The organization that is within the ISMS scope must be capable of physical and/or logical separation from third parties and from other organizations within a larger group. While this does not exclude third-party contractors, it does make it practically very difficult (although not necessarily impossible) to put an ISMS in place within an organization that shares with others significant network and/or informa- tion assets or geographic locations. A division of a larger organization that,
IT GOVERNANCE100
for instance, shares a group head office and head office functions with other divisions could not practically implement a meaningful ISMS. Usually, the smallest organizational entity that is capable of implementing an ISMS is one that is self-contained. It will have its own board of directors or manage- ment team, its own functional support, its own premises and control over its own IT network.
It is nevertheless possible for divisions of larger organizations to pursue certification independently; the critical factors are the relative independence of management and the extent to which the division can be practically differentiated from other divisions of the same parent organization.
For larger organizations, with a multiplicity of systems and extensive geographic spread, it is as a general rule often simpler to tackle ISO27001 and, in particular, risk assessment on the basis of smaller business units that meet the general description set out above. Larger organizations that have a single business culture and largely common systems throughout are proba- bly better off creating a single ISMS.
Once the organizational scope is identified, it is necessary to list the phys- ical premises that the chosen organization occupies and to identify its network and information assets. The implementation team should list these, but should only do it at this point at the highest possible level.
Identify the assets
Assets are discussed in more detail in Chapter 8. Primary assets are the key business processes and information. Key information assets may have be either information systems or bodies of information. A system consists of a number of components. A single data asset (such as a file, whether electronic or paper) is a component of a system. At this stage, we are concerned only with the systems, although at a subsequent point it may be necessary to analyse vulnerabilities down to the individual data asset level.
These systems will include a number of IT systems, consisting of software (eg client relationship management system, payroll system, e-mail system, resource planning system, accounting system), hardware (eg servers, work- stations, routers), telecommunications systems and paperwork filing systems. The implementation team should list the key systems and their components throughout the organization. There are software tools that can be used to ensure that all the data assets and all the IT systems have been identified, and these are discussed later.
Telecommunications systems will include mobile phones as well as desk- based systems; smartphones are as important a component of the IT system
THE RISK ASSESSMENT AND STATEMENT OF APPLICABILITY 101
as are the remote access points and subcontracted services. Critical paper filing systems are as important as digital folders and drives. All the systems need to be identified, and if, in the process of doing this, there are found to be significant sharings of assets or information sharings that were not identi- fied earlier, then the scope of the ISMS may need to be revisited.
Individual items should be grouped by similarity of item type and expo- sure to risk. The sales teams laptops could, for instance, be treated as a single asset group: they all do the same thing, have the same value to the organization and are exposed to the same range of threats. Every asset has an owner, and for the risk assessment to be useful it is necessary to identify (by position, rather than name) the individual who owns – who is account- able for – each information asset.
Identify criticality: the relationships between assets and objectives
The key objectives (which may have business, contractual or legal aspects to them) should be identified in the organization’s business plan. Of course, if they are not, then this is a good opportunity for senior executives to identify and agree the key objectives of the organization and to map the tasks neces- sary to deliver them.
Objectives are often expressed as being to do with increasing market share, or increasing profitability, or increasing margin. These, however, are really the outcomes of pursuing operational objectives such as ‘sell more of product X to customer type Y’. There will be a hierarchy of objectives that reflects the value that the organization places on the outcomes that their achievement will deliver. There will also be a number of underlying objec- tives, which are really business requirements (the activities that are considered important for the ongoing effective operation of the organiza- tion). ‘Comply with the law’ is likely to be such an objective and will be common to most organizations.
Organizational business plan objectives should, like all objectives, be SMART (specific, measurable, achievable, realistic and time-bound). The key objectives should be clearly documented and this, or an excerpt from the business plan in which they are identified, should form part of the ISMS records.
Once the key objectives are clearly identified, then those systems that are most important to their delivery can also be identified. This is best done by the whole implementation team in a single session (which, depending on the size of the organization, may take one or more days) with lots of flipcharts. The starting point, after agreeing the scope of the planned ISMS, should be
IT GOVERNANCE102
to brainstorm a list of all the systems used within the business, whether digital or not. The team can then move on to review and understand the business objectives and then identify the relationships between systems and objectives.
The objective is to reach a conclusion that reflects all members’ experi- ence and knowledge; that identifies all the systems and in which all the business objectives have their critical system dependencies identified. It is possible that some objectives will have more than one system, and these interdependencies should also all be noted. Note that external consultants could only achieve this objective through a facilitated workshop or an extensive series of one-to-one interviews. It is important that the whole range of experience, perception and prejudice is involved in the process at this time, as otherwise it is likely that key dependencies may be missed or misconstrued.
It usually makes sense, in this same session, to move straight on to rank- ing the systems in order of critical priority – taking into account the business, contractual and legal requirements – to the business. This tends to be the best way to take full advantage of the momentum generated in the first session and ensures that the fullest possible analysis of the priorities is carried out. Meaningful ranking will depend, of course, on the effectiveness of the earlier analysis and ranking of business objectives.
The resulting report, a schedule that shows critical systems as dependen- cies of key organizational objectives, should be reviewed and agreed by the senior management team of the organization. It is critical that there is the fullest possible agreement on this, as this will be a key building block of the ISMS. The whole process set out above should be fully documented.
It is worthwhile, in tackling this (and the tasks below), to adopt an approach that is pragmatic, questioning and transparent. By this, we mean that the risk assessment should be done, and driven, by human beings – it is a subjective exercise in an environment where returns are derived from taking risks – and that it is preferable to be ‘approximately correct, rather than precisely wrong’. All individual inputs will reflect individual prejudice; the process of gathering input should question this input to establish what is known – and what unknown – in the individual assessment.
It is now possible to assess the impact on the organization of confidential- ity, integrity and availability for each of the identified assets. Broadly speaking, impacts will fall into one (or more) of three damage categories: damage to the organization’s business (its competitive position, its finances and its reputation), to its contractual commitments or to its legal responsi- bilities. The project team should identify the nature of each impact.
THE RISK ASSESSMENT AND STATEMENT OF APPLICABILITY 103
The next step is to assess the extent of the possible loss for each potential impact. One object of this exercise is to prioritize treatment (controls) and to do so in the context of the acceptable risk threshold; it therefore makes sense to categorize possible loss rather than attempt to calculate it precisely. The categories of business loss (for a large organization) might be:
None Losses are between nil and £10,000 Minor Losses would be above £10,000 but lower than £50,000 Medium Losses would be above £50,000 but lower than £100,000 High Losses would be above £100,000 but lower than £1 million Very high Losses would be above £1 million and lower than £10 million Extreme Disastrous – the financial viability of the organization is
threatened
The financial equivalents provided above should be adjusted, under the board’s guidance, to levels appropriate to the size of the organization and its current risk treatment (or enterprise risk management) framework. In assessing the potential costs, all identifiable costs – direct, indirect and consequential – including the costs of being out of business, should be taken into account. The ‘better to be approximately correct than precisely wrong’ approach should continue to be deployed in this exercise.
Identify potential threats and vulnerabilities (likelihood)
For each of the assets on the schedule, it is now necessary to identify the possible vulnerabilities and the potential threats to the key business systems. There are a high number of threats, and the range of possible vulnerabilities is also substantial. The input of the trained information security expert is, at this point, invaluable and the guidance of ISO27005, which includes lists of threats and vulnerabilities, can also save time. Threats tend to be external to the systems (but not necessarily to the organization). They include hostile outsiders such as hackers, non-hostile outsiders such as suppliers or cleaning contractors, and insiders, both the disaffected and the committed but care- less, or even just the poorly trained. Vulnerabilities are security weaknesses in the existing systems, weaknesses that can be exploited by threats, or that allow one or more of the confidentiality, integrity and availability of the asset to be compromised, accidentally or otherwise. A vulnerability can also simply be the absence of a control or a weakness in its implementation.
It is necessary to consider the links between threats and vulnerabilities. An example might be cleaning contractors who inadvertently pick up (a minor threat, being the unintentional error of a third party) the only copy of
IT GOVERNANCE104
an extremely confidential document off an executive’s desk (a minor vulner- ability, the forgetfulness of an executive) in the ordinary course of cleaning, and dispose of it. At this point, only the availability of the data has been affected, and the repercussions might be minor, as it might be possible – if embarrassing and time-consuming – to recreate the document. However, once an industrial espionage operative rummaging through the waste sacks of the organization finds the document and makes it available to the organ- ization’s competitors, the confidentiality of the information will have been compromised and the cost to the organization of the security breach starts increasing dramatically.
A telephone system that crashes, losing all stored voicemail, could have a significant impact on any organization that relies on voicemail for sharing critical information. Such an organization needs to have thought through how it will manage the security of these data.
Inevitably, the exercise to identify threats and vulnerabilities to the systems cannot be carried out without also identifying vulnerabilities in systems, and impacts on the organization, that are not necessarily threats to the availability, confidentiality or integrity of its information, but to which there is nevertheless a significant cost. An example is in digital telephone systems that enable direct-line users to access their voicemail externally and to redirect calls. The evident threat to data confidentiality is that unauthor- ized users could access information stored in voicemail. If voicemails can be deleted externally, then there is the threat that unauthorized users might make information unavailable. In addition, an unauthorized user could be able to use the organization’s telephone number to forward calls to his or her own number anywhere else in the world, or even to dial from the exten- sion to anywhere else in the world.
Essentially, threats for each of the systems should be considered under the headings of threats to confidentiality, to integrity and to availability. Some threats will fall under one heading only, others under more than one. It is important to have carried out this analysis systematically and comprehen- sively, to ensure that no threats are ignored or missed. The effectiveness of the controls that the organization eventually implements will reflect the quality of this particular exercise.
Many external threats will be classified under all three headings. A hacker might be able to steal confidential data and then disrupt the information system so that data are no longer available or, if they are, they are corrupted. A virus can affect not only the integrity and availability of data but also, because it could mail out a copy of an address book, confidentiality as well.
THE RISK ASSESSMENT AND STATEMENT OF APPLICABILITY 105
A business interruption, such as a fire in a data centre or a filing cabinet, is likely to affect the availability and integrity of information.
Similarly, what is likely to be a threat to one system is not necessarily a threat to another. For example, a fire in the server room is a threat to a number of systems based there, but is unlikely to be a threat to an organiza- tion’s mobile phone network.
The penultimate step is to assess the probability or likelihood of each impact occurring. The probabilities that might be used are:
Negligible Unlikely: less than once every five years Very low Likely to occur less frequently than once per year
but more frequently than once every five years Low Likely to occur more than once every year
but less than once every six months Medium Likely to occur more than once every six months but less than once every month High Likely to occur more than once every month
but less than once every week Very high Likely to occur more than once every week
but less than once every day Extreme Likely to occur at least daily
Create a risk matrix, using the scales you have created, that has likelihood along one axis and impact along the other. The risk acceptance criteria can be represented on the matrix by means of mapping then blocking out the levels of likelihood and impact that managers consider acceptable. For each threat–vulnerability combination, you can the plot the risk level onto this matrix by plotting the intersection of the likelihood and impact. Any risks that fall outside the organization’s risk acceptance criteria must be treated.
The final step in this exercise is to transfer the risk level assessment for each impact to the risk log. Although the examples we have used are based on five levels, we suggest that – particularly for smaller organizations – three levels of impact and likelihood are usually adequate: low, moderate and high. Where the likely impact is low and the probability is also low, then the risk level could be considered very low; where the impact is at least high and the probability is also at least high, then the risk level would be very high; anything between these two measures would be classed as moderate. However, every organization has to decide for itself what it wants to set as the thresholds for categorizing each potential impact.
IT GOVERNANCE106
Selection of controls and Statement of Applicability
The standard, at clause 6.1.3, requires the organization to select appropriate information security risk treatment options and then determine all the controls necessary to implement the selected treatment. ‘Organizations can design controls as required or identify them from any source.’ This does mean that the organization is at liberty to deploy any appropriate control set (typically driven by internal and external context and the requirements of interested parties). Appropriate control sets could include those from PCI DSS, NIST, COBIT, Cloud Security Alliance or, of course, ISO/IEC 27002 and the related ISO27000 family of standards. ISO 27017 and ISO 27018 tend to be particularly popular for those organizations operating in the cloud, and processing personally identifiable information in the cloud.
The selected controls are then compared with those listed in Annex A of ISO27001, and the organization produces a Statement of Applicability which identifies, with justifications for both inclusions and exclusions, which Annex A controls have been selected, and which additional controls have been selected. In addition, the SoA should identify which of the selected controls have actually been implemented. Annex A is, in this sense, a refer- ent control set, which enables organizations to ensure that they have not missed any relevant controls. This book proceeds on the basis that the Annex A/ISO27002 control set has been selected.
ISO27002 provides best practice guidance on the implementation and operation of the controls listed in Annex A. There may, however, be some areas in which organizations may need to go further than is described in ISO27002, and the extent to which this may be necessary is driven by the extent to which technology and threats evolve after ISO27002:2013 was published.
Controls are selected in the light of a control objective. A control objec- tive is a statement of an organization’s intent to control some part of its processes or assets and what it intends to achieve through application of the control. The selection of controls should be cost-effective, which means that the cost of their implementation (in cash and resource deployment) should not exceed the potential impact (assessed in line with our discussion above) of the risks (including safety, personal information, legal and regulatory obligations, image and reputation) they are designed to reduce.
It is important that, when considering controls, the likely security inci- dents that may need to be detected should be considered and planned for. In
THE RISK ASSESSMENT AND STATEMENT OF APPLICABILITY 107
effect, the process of selecting individual controls, whether from Annex A or elsewhere, should include consideration of what evidence will be required: 1) to demonstrate that the control has been implemented and is working effectively (the measuring of effectiveness is addressed at the end of this chapter); and 2) that each risk has thereby been reduced to an acceptable level. In other words, controls must be constructed in such a manner that any error, or failure during its execution, is capable of prompt detection and that planned corrective action, whether automated or manual, is effective in reducing to an acceptable level the risk of whatever may happen next.
Annex A of the standard has 14 categories, each of which has a number of subsections. There are, in total, 114 controls, each of which has a four- component alphanumeric control number. Each needs to be considered and a decision made as to whether or not it is applicable. As the controls are selected, the Statement of Applicability (SoA) can start to be drawn up. This SoA, specified in 6.1.3.d of the standard, is documentation of the decisions reached against the previous requirement and also an explanation or justifi- cation for the selection or non-selection of the controls that are listed in Annex A and whether or not the control has been implemented. This docu- ment needs to be reviewed on a regular basis and will be one of the first documents that the external auditor will want to see. It is also the document that is used to demonstrate to third parties the control framework that has been implemented, and is referred to, with its issue status, in the certificate of conformity issued by third-party accredited certification bodies.
The SoA could form the core of an ISMS manual or adopt the format set out below. The wording provided in the standard is repeated with appropri- ate variations to reflect the actual decisions made by the management steering group and its reasoning. The SoA can also refer to other documents, where these form the basis for any specific decisions recorded in it or which implement the decisions described. There are different ways of expressing the way in which different controls are applied, some of which are in the example below. The SoA should be signed by the owner of the ISMS (likely to be the CEO) for which it has been drawn up. This document is, for the external certification auditor, key evidence of the steps taken between risk assessment and implementation of appropriate controls.
The fact that someone reviewing an ISO27001 certificate might ask to see the SoA referred to should point at an appropriate level of classification; realistically, a standalone SoA that doesn’t contain any sensitive security information is a practical solution.
IT GOVERNANCE108
Statement of Applicability Example
Introduction
This is the SoA, as specified in clause 6.1.3.d to ISO/IEC 27001:2013 (‘the Standard’), for ABC Ltd. It was adopted by the Management Steering Group on [date] and will be reviewed in the light of significant information security incidents and at least annually. It reflects a risk assessment carried out on [date]. Controls are addressed in the same order and using the same number- ing as in Annex A of the Standard, and this statement explains which controls have been adopted and identifies those that have not been adopted and sets out the reasons for non adoption. All of the adopted controls have been implemented.
Statement of Applicability
A.5.1.1 Policies for Information Security ABC Ltd has adopted this control in order to meet business and contractual
requirements
A.6.1.2 Segregation of Duties ABC Ltd has adopted this control in order to meet regulatory requirements
A.6.2.2 Teleworking ABC Ltd has not adopted this control as it has no teleworking sites
As we indicated earlier, some thought needs to be given to the circulation of your SoA: it will be referenced on the certificate awarded following a successful audit to ISO27001, and so anyone who knows anything about ISO27001 certification will want to see a copy of the SoA as well as the certificate (and any other documents describing the scope, but this is normally stated on the certificate in its entirety). This suggests that the SoA will need to be a public document.
A catch could be that the complete SoA might include references to assets that the controls relate to and/or the ISMS documents that give life to the controls, and may have content in it that needs to be kept away from ‘public’ consumption. Those customers or other third parties who require sight of the SoA in order to establish the nature of the ISMS would therefore have to enter into a non-disclosure agreement before they could do so. This leads some organizations to produce two versions of their SoA, a limited version
THE RISK ASSESSMENT AND STATEMENT OF APPLICABILITY 109
for public consumption and a comprehensive version for internal or controlled use only.
For example, with the following SoA table (Table 6.1), the version containing the white columns could be made available publicly and access to the complete version that includes the shaded columns could be restricted. The ‘applied’ column provides for 3 options: yes and implemented; not selected.
TABLE 6.1 Statement of Applicability (SoA) table
Control Applied Y/YA/N JustificationReference Description
A.5.1.1 Infosec policies
Y Required by ISO 27001 with additional
policies required as a result of the information security risk assessment
– – – –
– – – –
This book will explore each of the controls listed under Annex A, looking to the good practice set out in ISO27002 for how best to implement them. The book will (mostly) tackle the controls in the order laid out in the standard; the organization should, however, tackle and implement controls in the order of priority identified through the baseline security criteria, the risk assessment and the risk treatment plan. The controls that are most critical for the organization will be those that relate to the threats and vulnerabili- ties that it has identified, through the risk assessment process, as being most serious to its most critical systems and/or information.
Gap analysis
As we said earlier, the reality is that most organizations that embark on ISO27001 already have a number of information security measures in place; ISO27001 necessitates ensuring that those controls that are in place are adequate and appropriate and that additional required controls are implemented as quickly as possible. In other words, an analysis of the gap between what is in place and what might be required might be carried out
IT GOVERNANCE110
could be a useful point of reference when carrying out the risk assessment; bear in mind, as well, our comments about the need for the management system as a whole to work to deliver the information security objectives.
The SoA will be complete once all the identified risks have been assessed and the applicability or otherwise of all the Annex A controls has been considered and documented. Usually, the SoA is started before any controls are implemented, and completed as the final control is put in place.
Risk assessment tools
There is a small number of software tools available that can, to a varying extent, automate the risk assessment process and generate the SoA. In theory, such a tool ought to encourage the user to perform a thorough and compre- hensive security audit on the organization’s information systems, and ought not to produce too much paperwork as a result. Tool availability is likely to change as the Standard is more widely taken up, and any organization inter- ested in pursuing this route should therefore do up-to-date research on what is available before making a shortlist. This book’s website contains informa- tion on available tools, including VS Risk™, from Vigilant Software Ltd.
The organization will need to compare tools before making a selection and should concentrate, in the comparison process, on the extent to which the tool really does easily and effectively automate the risk assessment and SoA development process; the amount of additional paperwork it generates; the flexibility it offers for dealing with changing circumstances and frequent, smaller-scale risk assessments; and the meaningfulness of the results it gener- ates. Of course, normal due diligence should also be done into the status of the supplier and manufacturer of the product to ensure that it is properly supported and likely to continue to be. References might also be sought from happy customers.
Risk assessments can, with difficulty, be done without using such tools. A thorough risk assessment, using a manually created spreadsheet for instance, for any significant business will be very time-consuming, and even more so if a software tool is not used. ‘Time-consuming’ means up to three months, or even longer for larger organizations. The use of a software tool will depend on the culture of the organization and the preferences of the infor- mation security adviser and manager. Practically speaking, once the organization has decided to purchase such a tool, it becomes dependent on that tool and on the staff members who are trained to use it. In considering
THE RISK ASSESSMENT AND STATEMENT OF APPLICABILITY 111
the appropriate route forward, consideration should be given to the speed with which incoming staff can become familiar with the chosen risk assess- ment tool; practicality and ease of use are likely to be key attributes.
If the organization decides to purchase such a tool, the steering group should document the reasons for its choice and selection; whoever is to use it will, of course, have to be appropriately trained in its use. Evidence of this training and level or proficiency achieved should be retained on the relevant HR file.
Risk treatment plan
Clause 6.1.3.e of the standard requires the organization to ‘formulate an information security risk treatment plan’; this should identify the appropri- ate management action, responsibilities and priorities for managing information security risks. Clearly, the risk treatment plan needs to be docu- mented. It should be set within the context of the organization’s information security policy and it should link clearly to the documents which set out the organization’s approach to risk and its criteria for accepting risk, as discussed earlier in this chapter. The risk assessment process must be formally defined, and responsibility for carrying it out, reviewing it and renewing it formally allocated. At the heart of the risk treatment plan is a detailed schedule that shows, for each identified risk, how the organization has decided to treat it, what controls are already in place (the baseline security controls), what additional controls are considered necessary, and the time-frame for imple- menting them. The gap to the acceptable risk threshold needs to be identified for each risk, as well as the risk treatment option that will bring the risk within an acceptable level.
ISO27001 imports the enterprise risk management concept of a Risk Owner into information security management. At 6.1.3.f, the Standard says that the Risk Owner must approve the risk treatment plan and accept any residual risk. The risk owner could be top management as a whole, or it could be an individual line or functional manager, as the organization considers appropriate. What matters is that the risk owner role is clearly allocated (and in line with clause 5.3), understood and effective, and that the risk owner’s formal approval for the RTP, and any residual risk (the risk left over after treatment) in respect of those risks for which they are responsible – is documented.
IT GOVERNANCE112
The Risk Treatment Plan may identify controls that are to be deployed in the future, whether for financial or operational reasons and, as long as the risk owner formally accepts the interim residual risk, this is a practical approach. It may also be that the treatment plan requires a series of actions at different times, with different priorities; a sensible RTP will define the timelines, responsibilities and dependencies.
The risk treatment plan links the risk assessment (expressed in the corpo- rate information asset and risk log) to the identification and design of appropriate controls, as described in the SoA, such that the board-defined approach to risk is implemented, tested and improved. This plan should also ensure that funding and resources for implementation of the selected controls are adequate, and should set out clearly what these are. The risk treatment plan should also identify and consider the individual competence and broader training and awareness requirements necessary for its execu- tion and continuous improvement.
We see the risk treatment plan as the key document that links all four phases of a Plan–Do–Check–Act (PDCA) cycle for the ISMS. It is a high- level, documented identification of who is responsible for delivering which risk management objectives, of how this is to be done, with what resources, and how this is to be assessed and improved; but at its core is the detailed schedule describing who is responsible for taking what action, in respect of each risk, to bring it within acceptable levels.
The risk treatment plan is a living document. As new risks are identified, old risks change, or improvement opportunities identified, the risk treat- ment plan needs to be updated. The organization needs, therefore, to have a managed process in place that ensures that revised (or new) risk assessments feed through to a revised risk treatment plan and that, where appropriate, changes are signed off by the risk owner.
Measures of effectiveness
ISO/IEC 27001:2013 requires, in clause 9.1, the organization to evaluate information security performance and the effectiveness of the ISMS. One aspect of this is to measure the effectiveness of controls (or groups of controls); controls are implemented to achieve a control objective, the control objectives are linked to the objectives for information security and, therefore, the effectiveness of each control contributes toward the overall effectiveness of the ISMS.
THE RISK ASSESSMENT AND STATEMENT OF APPLICABILITY 113
Measures of control effectiveness are ideally agreed during control selec- tion, but this can also be done later. In a sense, the structured decision process required by the risk assessment methodology, and the fact that controls are selected by objective, means that it is reasonable to deduce that if a prescribed control is fulfilling its objective (ie to reduce the predicted risk to the acceptable level) then it is being effective. In designing measures of effectiveness, there are three questions that must be answered:
●● What is the objective of each control?
●● How can you determine if the control is being effective?
●● What are the parameters that will give a positive or negative indication of control effectiveness?
ISO/IEC 27004 provides guidance on measuring control and information security management effectiveness.
Monitoring of measures of effectiveness can be particularly resource- intensive and so it is worth considering, at the point of selecting the controls, the basis on which the measures of effectiveness will be selected and moni- tored. A certification auditor would find it hard not to accept the selection of monitoring measures based on the largest risk areas, or in relation to those controls that have the biggest positive effect on reducing residual risk, and those should be reported to senior managers at the management review.
ISO27001 is an outcome-orientated management standard. It is a clear requirement of the standard (at clause 6.2) that the organization must moni- tor the performance of cti ISMS against its objectives; this is key demonstrating, to top management and interested parties, the effectiveness of the ISMS. All the principles of good performance management hold good when applied to information security and measuring the effectiveness of the ISMS and controls. In particular:
●● Over-reliance on negative reporting is likely to result in flawed measures.
●● Automated monitoring is preferable to manual arrangements.
●● The exact aspect being measured needs to be aligned with the main objective.
●● The integrity of the measures or statistics being produced is of paramount importance, as management decisions are likely to be based on this information.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.