{"id":1627,"date":"2021-05-20T19:54:24","date_gmt":"2021-05-20T19:54:24","guid":{"rendered":"https:\/\/blog.samarthya.me\/wps\/?p=1627"},"modified":"2021-05-20T20:16:41","modified_gmt":"2021-05-20T20:16:41","slug":"isg-information-security-governance","status":"publish","type":"post","link":"https:\/\/blog.samarthya.me\/wps\/2021\/05\/20\/isg-information-security-governance\/","title":{"rendered":"ISG: Information security governance"},"content":{"rendered":"\n<p class=\"has-drop-cap\">Rules that run the organisation = Governance. ISG includes the element required to provide the Senior Management assurance that its direction and intent are reflected in the security posture of the organisation. <\/p>\n\n\n\n<figure class=\"wp-block-pullquote has-background has-luminous-vivid-orange-background-color is-style-solid-color\"><blockquote class=\"has-text-color has-white-color\"><p>Policies + Standards + Procedures = Governance<\/p><\/blockquote><\/figure>\n\n\n\n<p>Information security governance objective is to `establish and\/or maintain an information security strategy in alignment with organisation goals and objectives to guide the establishment and\/or ongoing management of the information security program`.<\/p>\n\n\n\n<p>The outcomes that senior management wants from the information security program defines the security governance building block and are often defined in terms of risks management and acceptable levels of risk.<\/p>\n\n\n\n<p>It is a subset of corporate governance, and must be consistent with the enterprise&#8217;s governance. It provides strategic direction for security activities and ensures that objectives are achieved.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Strategic Alignment: Align <code>Information security<\/code> to <code>Business security<\/code> to support organisational objectives.<\/li><li>Risk Management: Executing appropriate measures to mitigate <code>risk<\/code> and reduce potential impacts on information resources to an acceptable level.<\/li><li>Value delivery: Optimising <code>security investments<\/code> in support of business objectives.<\/li><li>Resource Optimisation<\/li><li>Performance measurement: Monitoring and Reporting.<\/li><li>Assurance process integration: It operates as intended.<\/li><\/ol>\n\n\n\n<p>A governance framework will consist of <\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>A comprehensive security strategy intrinsically linked with business objectives<\/li><li>Governing security policies that clearly expresses the managements intent and addresses each aspect of strategy, controls and regulation<\/li><li>A complete set of standards for each policy to ensure that people, procedures, practices and technologies comply with policy requirement and sets appropriate baselines for the enterprise.<\/li><li>An effective organisational structure, with sufficient authority and adequate resources, void of conflict of interest.<\/li><li>Defined workflows and structures that assist in defining responsibilities and accountability for information security governance.<\/li><li>Institutionalised metrics and monitoring processes to ensure compliance, provide feedback on control effectiveness and provide the basis for appropriate management decision.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Who defines the want?<\/h2>\n\n\n\n<p>Senior Management and Business unit leaders.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who defines the Strategy<\/h2>\n\n\n\n<p>Information security manager defines the security program. ISM does GAP analysis to identify how to go from the current state to the desired state which becomes the basis of strategy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Security Strategy: Desired State of the Enterprise<\/h2>\n\n\n\n<p>It is based on the outcomes set by the senior management.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is SS?<\/h3>\n\n\n\n<p class=\"has-drop-cap\">A security strategy will define the approach of achieving the security program outcomes management wants. It is a statement of how security aligns with and supports business objectives, and it provides the basis for good security governance.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Policy<\/h3>\n\n\n\n<p>They are statement of managements intent and direction at a high level. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Security Policy <\/h4>\n\n\n\n<p>To address viable threats to the organisation, prioritised by the likelihood of occurrence and their potential impact on the business. The strictest policies apply to the areas of greatest business value.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Standard <\/h3>\n\n\n\n<p>How we want the things to be or rather how it should be defines a standard. They define the boundaries for people, process, procedure, and technologies to maintain compliance with policies and support the achievement of the organisations goal and objectives. There can be several standards for the same policy based on the classification level e.g for Information &#8211; Confidential, Private, Public. Collectively standards are combined with other controls to create security baseline.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Guideline<\/h3>\n\n\n\n<p>Guidelines are usually the desires of the organisation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Baseline<\/h3>\n\n\n\n<p>Lowest level of acceptable risk. Standards along with controls create a baseline.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Procedure<\/h3>\n\n\n\n<p>Objective of procedure is to work as intended step by step. It should be unambiguous and should meet the applicable standards and therefore comply with policy.<\/p>\n\n\n\n<figure class=\"wp-block-pullquote is-style-solid-color\"><blockquote><p>A business case is used to capture the business reasoning for initiating a project or a task.<\/p><\/blockquote><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Rules that run the organisation = Governance. ISG includes the element required to provide the Senior Management assurance that its direction and intent are reflected in the security posture of the organisation. Policies + Standards + Procedures = Governance Information security governance objective is to `establish and\/or maintain an information security strategy in alignment with [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1429,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[34],"tags":[185,172,186],"class_list":["post-1627","post","type-post","status-publish","format-image","has-post-thumbnail","hentry","category-technical","tag-cism","tag-notes","tag-review","post_format-post-format-image"],"_links":{"self":[{"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/posts\/1627","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/comments?post=1627"}],"version-history":[{"count":0,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/posts\/1627\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/media\/1429"}],"wp:attachment":[{"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/media?parent=1627"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/categories?post=1627"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/tags?post=1627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}