Information security management explained

Information security management (ISM) defines and manages controls that an organization needs to implement to ensure that it is sensibly protecting the confidentiality, availability, and integrity of assets from threats and vulnerabilities. The core of ISM includes information risk management, a process that involves the assessment of the risks an organization must deal with in the management and protection of assets, as well as the dissemination of the risks to all appropriate stakeholders.[1] This requires proper asset identification and valuation steps, including evaluating the value of confidentiality, integrity, availability, and replacement of assets.[2] As part of information security management, an organization may implement an information security management system and other best practices found in the ISO/IEC 27001, ISO/IEC 27002, and ISO/IEC 27035 standards on information security.[3] [4]

Risk management and mitigation

Managing information security in essence means managing and mitigating the various threats and vulnerabilities to assets, while at the same time balancing the management effort expended on potential threats and vulnerabilities by gauging the probability of them actually occurring.[5] [6] A meteorite crashing into a server room is certainly a threat, for example, but an information security officer will likely put little effort into preparing for such a threat. Just as people don't have to start preparing for the end of the world just because of the existence of a global seed bank.[7]

After appropriate asset identification and valuation have occurred, risk management and mitigation of risks to those assets involves the analysis of the following issues:[8]

Once a threat and/or vulnerability has been identified and assessed as having sufficient impact/likelihood on information assets, a mitigation plan can be enacted. The mitigation method is chosen largely depends on which of the seven information technology (IT) domains the threat and/or vulnerability resides in. The threat of user apathy toward security policies (the user domain) will require a much different mitigation plan than the one used to limit the threat of unauthorized probing and scanning of a network (the LAN-to-WAN domain).

Information security management system

An information security management system (ISMS) represents the collation of all the interrelated/interacting information security elements of an organization so as to ensure policies, procedures, and objectives can be created, implemented, communicated, and evaluated to better guarantee the organization's overall information security. This system is typically influenced by an organization's needs, objectives, security requirements, size, and processes.[9] An ISMS includes and lends to risk management and mitigation strategies. Additionally, an organization's adoption of an ISMS indicates that it is systematically identifying, assessing, and managing information security risks and "will be capable of successfully addressing information confidentiality, integrity, and availability requirements."[10] However, the human factors associated with ISMS development, implementation, and practice (the user domain) must also be considered to best ensure the ISMS' ultimate success.[11]

Implementation and education strategy components

Implementing an effective information security management (including risk management and mitigation) requires a management strategy that takes note of the following:[12]

Without sufficient budgetary considerations for all the above—in addition to the money allotted to standard regulatory, IT, privacy, and security issues—an information security management plan/system can not fully succeed.

Relevant standards

Standards that are available to assist organizations with implementing the appropriate programs and controls to mitigate threats and vulnerabilities include the ISO/IEC 27000 family of standards, the ITIL framework, the COBIT framework, and O-ISM3 2.0. The ISO/IEC 27000 family represents some of the most well-known standards governing information security management and their ISMS is based on global expert opinion. They lay out the requirements for best "establishing, implementing, deploying, monitoring, reviewing, maintaining, updating, and improving information security management systems." ITIL acts as a collection of concepts, policies, and best practices for the effective management of information technology infrastructure, service, and security, differing from ISO/IEC 27001 in only a few ways.[13] [14] COBIT, developed by ISACA, is a framework for helping information security personnel develop and implement strategies for information management and governance while minimizing negative impacts and controlling information security and risk management,[15] and O-ISM3 2.0 is The Open Group's technology-neutral information security model for enterprise.[16]

See also

External links

Notes and References

  1. Book: Practical Information Security Management: A Complete Guide to Planning and Implementation . Chapter 1: Evolution of a Profession . Campbell, T. . APress . 1–14 . 2016 . 9781484216859.
  2. Book: Information Security Management Handbook . Tipton, H.F.. Krause, M. . CRC Press . 5th . 810–11 . 2003 . 9780203325438.
  3. Book: https://books.google.com/books?id=Yy6pCwAAQBAJ&pg=PA11 . Chapter 2: ISO/IEC 27001 ISMS Family . Implementing the ISO/IEC 27001:2013 ISMS Standard . Humphreys, E. . Artech House . 11–26 . 2016 . 9781608079315.
  4. Book: Practical Information Security Management: A Complete Guide to Planning and Implementation . Chapter 6: Standards, Frameworks, Guidelines, and Legislation . Campbell, T. . APress . 71–94 . 2016 . 9781484216859.
  5. Web site: IT Security Vulnerability vs Threat vs Risk: What's the Difference? . Watts, S. . BMC Blogs . BMC Software, Inc . 21 June 2017 . 16 June 2018.
  6. Book: Practical Information Security Management: A Complete Guide to Planning and Implementation . Chapter 4: Organizational Security . Campbell, T. . APress . 43–61 . 2016 . 9781484216859.
  7. Lundgren . Björn . Möller . Niklas . 2019 . Defining Information Security . Science and Engineering Ethics . en . 25 . 2 . 419–441 . 10.1007/s11948-017-9992-1 . 1353-3452 . 6450831 . 29143269.
  8. Book: https://books.google.com/books?id=kvBCDQAAQBAJ&pg=PA2 . Chapter 1: Information Systems Security . Fundamentals of Information Systems Security . Kim, D.. Solomon, M.G. . Jones & Bartlett Learning . 2–46 . 2016 . 9781284128239.
  9. Web site: Information Security Management System (ISMS) Overview . https://web.archive.org/web/20160807021631/https://chapters.theiia.org/bermuda/Events/ChapterDocuments/Information%20Security%20Management%20System%20(ISMS)%20Overview.pdf . Terroza, A.K.S. . The Institute of Internal Auditors . 12 May 2015 . 7 August 2016 . 16 June 2018.
  10. Web site: Need: The Need for ISMS . Threat and Risk Management . European Union Agency for Network and Information Security . 16 June 2018.
  11. Book: Human Aspects of Information Security, Privacy, and Trust . Proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust . Alavi, R.. Islam, S.. Mouratidis, H. . A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations . Lecture Notes in Computer Science . 8533 . 297–305 . 2014 . 10.1007/978-3-319-07620-1_26. free . 978-3-319-07619-5 .
  12. Book: Information Security Management Handbook . Tipton, H.F.. Krause, M. . CRC Press . 6th . 3 . 100–02 . 2010 . 9781420090956.
  13. Book: Fundamentals of Information Systems Security . Kim, D.. Solomon, M.G. . Jones & Bartlett Learning . 225 . 2016 . 9781284128239.
  14. Web site: ISO 27001 vs. ITIL: Similarities and differences . Leal, R. . The ISO 27001 & ISO 22301 Blog . Advisera Expert Solutions Ltd . 7 March 2016 . 16 June 2018.
  15. Web site: What is COBIT? A framework for alignment and governance . White, S.K. . CIO . IDG Communications, Inc . 22 December 2017 . 16 June 2018.
  16. Web site: Open Information Security Management Maturity Model (O-ISM3), Version 2.0 . The Open Group . 21 September 2017 . 16 June 2018.