Isms
Isms
Isms
Page 1 of 5
Introduction
Information security has always been looked upon as a necessary evil by business people and management. One of the biggest challenges for INFOSEC professionals has been to sell security to management. Some of the recent events like the 9/11, the big blackout in northeast, virus/worm attacks etc., have really brought information security to the work table of the Government, management and other decision makers. On the same token, information security is no good until it is effectively managed and controlled. This paper makes an attempt to discuss the concepts of Information security management systems (ISMS)
mhtml:file://E:\Whitepaper\Information%20Security%20Management%20Systems.mht
10/29/2003
Page 2 of 5
standards. Included are: ISO 17799/BS17799 ISO17799 is for the IT security industry, what ISO 9000 is for the TQM industry. It attempts to protect the quality of the C,I,A of information. ISO 13335 Guidelines for management of IT security GASSP Generally accepted system security principle. Recently, ISSA is initiating an effort in the development and maintenance of the Generally Accepted Information Security Principles (GAISP). ISMS fits nicely into all these buckets.
Designing ISMS
The first step in designing an ISMS is to select the framework within which the ISMS will function. The framework will depend on the type of industry or the need to go for certification (such as BS7799)
Terminology
There should be a consistent use of terminologies in the entire ISMS infrastructure so that there is no room for confusion. In addition, the definitions to terminologies should be concise and clear. For example, a standard is defined as requirement that supports the policy and can be measured, whereas a guideline is defined as a best practice recommendation on how to meet requirements.
The environment
It is always helpful to understand the environment and the space in which the enterprise is working in to effectively design an ISMS. It is beneficial to know if the ISMS will ultimately satisfy a marketing requirement or a legal requirement for the enterprise. Some additional information on the environment that can be gathered could be: An org chart of the enterprise Is management centralized or decentralized?
Building ISMS
Building an ISMS involves many steps. While performing each step, inputs from all the stakeholders identified above should be included and results discussed to reach an agreed upon path. A security manual serves as the central repository for ISMS. This manual will be maintained by the Chief security officer and usually considered a confidential document. The various steps involved in building an ISMS are:
mhtml:file://E:\Whitepaper\Information%20Security%20Management%20Systems.mht
10/29/2003
Page 3 of 5
Controls
The need for controls is an outcome of the risk assessment process. Once the need for controls is decided, the choice of control is done based on a cost-benefit analysis of the asset it is protecting and the controls cost itself. In ISMS, controls can be software, hardware, person or a process. In a good ISMS, they should be implemented and used for their intended purposes only.
Maintaining an ISMS
Everything in Information security should be an iterative process. ISMS is no different. An ISMS is built with a snapshot of information and may become outdated or obsolete, rendering the ISMS ineffective. A yearly audit of the ISMS is suggested. The audit should reveal the following: Are the controls online and performing their intended functions? Are there any new risks identified that need to be addressed? Do the policy, standards, guidelines and procedures need to be changed or updated? Identify gaps between what was set forth in the ISMS manual and what the practice is
mhtml:file://E:\Whitepaper\Information%20Security%20Management%20Systems.mht
10/29/2003
Page 4 of 5
HIPPA
Health Insurance Portability and Accountability Act, applies to the health care industry and attempts to put forth requirements and guidelines to protect the privacy of common individuals, when it comes to dealing with hospitals, doctors, pharmacies etc. HIPPA addresses the same topics, ISO 17799 addresses in its 10 domains, with an emphasis on privacy of information.
demonstrated in the BITS Security Assessment Expectation Matrix document, BITS has recognized the value of ISO17799, mapping segments of the BITS framework to the various ISO17799 control areas. Hence an ISO17799 based Information Security Management System (ISMS) can easily integrate into the BITS framework
Finally..
ISMS attempts to achieve due diligence on the part of management to mitigate business risks. It is common sense to say that the most secure piece of hardware is one that is turned off and does not have a power connection to it. However, this isnt practically feasible. Many enterprises boast of possessing the latest and greatest security/network technology. However, the entire infrastructure is rendered ineffective if there is no good security management in place. Not long ago, Information security management was considered an expensive add-on. However, it is not illogical to conclude that the recent disastrous events and few regulations that followed will make enterprises consider ISMS at a more
mhtml:file://E:\Whitepaper\Information%20Security%20Management%20Systems.mht
10/29/2003
Page 5 of 5
serious level.
mhtml:file://E:\Whitepaper\Information%20Security%20Management%20Systems.mht
10/29/2003