Continual Improvement
Continual Improvement
Continual Improvement
Continual improvement
improving efficiency of the ISMS and controls in meeting security objectives; and/or
improving the effectiveness of the ISMS and controls in meeting security objectives.
Continual improvement needs to be promoted by leadership and commitment of management and should
be included in policy, planning and resources. Implementing a continual improvement process will help an
organisation create prioritised and cost-effective improvements that are aligned to business requirements and
available resources. Resulting monitoring and reporting capabilities will then increase the potential to identify
further opportunities for improvement.
Making improvement
an objective from the
outset will improve both
efficiency and security.
12 Continual improvement
12
The process for continual improvement should be defined and overseen by the information security function
within the organisation. The process should be integrated into existing procedures and processes where
possible, so that existing process managers will be responsible for implementing the continual improvement
process within their respective area.
The Deming cycle is a method for continual improvement, characterised by the Plan-Do-Check-Act
iterative steps
The ITIL set of practices for IT service management defines a seven-step improvement process.
12 Continual improvement
73
One example of how these processes might relate to continual improvement of an ISMS is given below:
Table 6 - Sample mapping of Deming cycle to ITIL 7 step process
Deming Cycle
Plan
Example activities
Scoping
Risk assessment and risk
treatment plans
Identify the strategy for
improvement
Define what you will measure
Do
Check
Act
74
Primary improvement
Strategy
Suitability
Examples
Practice
Effectiveness
Process
Efficiency
Organisational changes
12.4 Steps in an improvement process
Improvements can be made in the short or long term. However most improvements will follow the process
below:
12 Continual improvement
75
Changes in business
requirements/circumstances
Changes in regulatory
environment
Sources of information
User/customer engagement
Service requests
Risk assessments
Vulnerabilities
External audits
76
Who will provide ownership and direction for information security improvement?
Where does information security report within the organisation (i.e. level of seniority)?
How quickly does the organisation wish/need to change?
How much resource can be made available?
What is the scope and remit of the improvement programme?
How can goals be made specific, in order to provide clear directing and measurable targets?
12.6.2 Where are we now?
To measure its current level of maturity of information security, the organisation can carry out benchmarking
and comparisons with similar organisations. This can give an indication of relative maturity and help to
prioritise certain work areas.
Assessment may also be carried out via self-assessment, internal or external audit. Self-assessment can
be a useful tool, but involves time and effort from internal staff, and the level or assurance may not be as
great as that provided by a more formal audit. However, this will often be an appropriate starting point
for an improvement process. External audits may provide more assurance and act as a greater catalyst for
improvement, but can be more costly.
12.6.3 Planning and implementing (where do you want to be and how to get there)
Once the organisation has analysed its current state and compared it to its desired state, the results should be
documented and compared in a gap analysis, which will form the basis of the improvement programme.
The gap analysis will provide the objectives for the improvement programme, which should be prioritised
according to business requirements and an assessment of how much effort is required. Certain objectives
might provide the opportunity for quick-wins, which can be useful to improve buy-in and demonstrate
progress, whereas other activities may need long-term projects to achieve. Benchmarking against similar
organisations can also prove to be useful during the prioritisation process.
Improvement plans for identified activities can then be planned in an incremental manner to increase the
overall level of maturity in a measurable way. For example, in planning to improve awareness of individuals
across the organisation, where the organisation has identified that it needs to train everyone annually, the
following stages might provide observable milestones:
12 Continual improvement
77
Milestone
Low
Medium
Information security awareness training is compulsory for all users within the
organisation and is repeated on an annual basis
High
Information security awareness training is compulsory for all users within the
organisation, is repeated on an annual basis, and awareness is tested and measured by
such means as spot checks, incident simulations, tests etc.
12.7 Measurement
In order to determine whether or not goals have been achieved, appropriate measurements should be used
(see Chapter 10, Measurement, for further information).
Summary
The goal of continual improvement is to iteratively identify and implement ways to make an established
ISMS more cost effective and appropriate
Continual improvement should be an objective from the outset when implementing any ISMS
78
Resources
Reading list
No resources.
No items.