Information Security Delivery - Scenario 7
Information Security Delivery - Scenario 7
GRANCOLOMBIAN POLYTECHNIC
VIRTUAL MODALITY
2021
Security of the information
CASE STUDY
Datalatina is a Latin American firm dedicated to assurance, risk management, quality and
security of information systems. The staff of consultants and teachers of this firm have the main
international certifications associated with the scope of their tasks, which have been issued by
prestigious academic organizations, such as ISACA, PMI, DRI, among others. This, added to the
vast experience generated through more than 30 years of commitment to the client, makes
Datalatina a leading company in the solutions it offers. Datalatina's three business lines are:
solutions, software and training. Solutions line: provides consulting and training on good
corporate governance, with references such as COSO and IT governance with COBIT;
comprehensive risk and audit management; money laundering and terrorist financing risk
management; information security management; business continuity management, taking as
reference the ISO 22301 standard; ethical hacking; compliance and legislation; and customized
solutions. Software line: Datalatina uses Meycor software; has developed applications for IT
governance with Cobit, ISO 27001 information security and corporate risk management aligned
with the ISO 3100 Standard. Training line: is an ISACA authorized center for training and
certification in ISA, CISM, CGEIT, CRISC, CISSP and DRI.
Datalatina is ISO/IEC 27001 certified, which ensures quality in terms of safety according to said
standard and has important clients worldwide, in addition, it works through representatives in
different countries.
Security of the information
1. Define the security policy for Datalatina, according to the structure seen in Scenario 5.
Information is currently a very important asset for companies and/or people, for this reason it
must be protected regardless of the way it is transmitted, stored and shared, due to this
information security implementations are carried out.
1.2 Introduction
Datalatina, in accordance with its mission, vision and business strategy, decides to implement an
ISMS that seeks to maintain the confidentiality, integrity and availability of both the company's
information and that of its clients, having as premises risk management, the commitment of
collaborators in the maintenance and continuous improvement of processes.
Datalatina adopts the Information Security Policy as a framework for the creation and
development of measures, norms, standards, procedures and controls that regulate the proper
use of information, providing a safe environment for its treatment, complying with security
requirements. contractual, regulatory and legal provisions in force.
1.3 Aim
• Evaluate and consider the vulnerabilities and threats to information security for each of
the assets that the company considers essential and/or important for its work and
business continuity.
Security of the information
• Ensure the confidentiality of the guideline processes proposed by the company such as
customer information.
• Ensure the integrity and availability of the companies' assets in which they are used in
the operational part and shared with their clients.
1.4 Scope
This policy is applicable to Datalatina's solutions, software and training business lines, ensuring
the three key pillars for Information Security, as well as to its officials (managers, consultants
and teachers), suppliers, contractors and anyone who Due to its exercise, it has access to the
information assets of the company and/or its clients.
1.5 Responsible
• Senior management team are responsible for ensuring that the information security
policy is managed within the organization, as well as establishing the priorities for
securing the assets managed in the company.
• Collaborators must adhere to the parameters indicated in the information security policy
implemented in the company, avoiding disclosure of unauthorized or unauthorized
materials, protecting the information of the company and its clients that they are given
access to. work areas, report failures within the policy and violations that occur in your
work environment.
• Security officer will be in charge of providing appropriate advice for the continuous
improvement of the information security policy, as well as the availability of reports that
must be carried out continuously.
• Clients must not distribute any confidential information of the company except with the
authorization of the company, as well as comply with the
Security of the information
policies that are managed in the company to be able to proceed with the availability,
integrity and confidentiality of the information in which each one interacts
1.6 Beginning
• The respective sanctions will be taken for any person who violates the proposed and
implemented security policy.
• Any risk that does not affect business continuity and is within the margin accepted by
the company will be accepted.
• Defined monitoring will be carried out to verify the implementation of the security
policy.
• Each area in charge of the assets will be ready to respond to the materialization of a risk.
• Continuous evaluation must be carried out to new risks that may arise in the course of
the implementation of information security, updating the policies to comply with the
policy objectives.
• Better management is evident in the handling of information for the company and
clients, managing to better apply its services.
• Continuous controls and improvements are carried out in the risk assessment for each of
the assets, preserving availability, integrity and confidentiality.
• Approval and peace of mind from customers for the security that will be implemented in the
company's business lines
2. Propose a policy development and implementation plan that contains the following:
a. ISMS Objectives
b. High-level definition of the scope and reference framework for the ISMS
c. Procedures and controls that support the policy
d. Definition of roles and responsibilities
e. Indication of high level of scope and limit at the physical level of ICT and organization.
Security of the information
Effectiveness in
Identify, control, prevent and/or
the # of risk plans executed in the
mitigate information security risks, in
1 execution of plans quarter/ # of plans proposed
order to avoid incidents that may affect
mitigation of in the quarter
reputation, applicable legal and
risks
regulatory requirements.
Establish and implement policies, Effectiveness in
the # of incidents closed on the
regulations and procedures that allow
proposed date/ # of incidents
2 safeguarding and protecting the management of
incidents of selected
information of Datalatina and its
security of by the end of the quarter
clients. the
Develop activities of
awareness and training that allows Compliance of # of training
the
3 disseminating the guidelines, policies carried out/#scheduled
program of
and hello good practices training trainings
associated with information security.
b. High-level definition of the scope and reference framework for the ISMS
This policy is applicable to Datalatina's solutions, software and training business lines, ensuring the
three key pillars for Information Security, as well as its officials (managers, consultants and
teachers), suppliers, contractors and all
Security of the information
anyone who, due to their exercise, has access to the information assets of the company and/or its
clients.
For the construction of Datalatina's Information Security Management System, the following has
been taken as a reference:
PROCEDURE AIM
Achieve a physical work environment in accordance with
the requirements of Confidentiality, Integrity
and
Procedure for working in safe areas
Availability of the company's information assets, in
accordance with what is required by the Information
Security Management System.
PROCEDURE AIM
The Strategic Management Process headed by the Manager actively supports information
security within the organization, defining the guidelines and guidelines under which the ISMS
must operate; Among its responsibilities are:
• Maintain within the staff, an employee who responds to the role of ISMS Leader,
who will be in charge of managing everything related to information security in the
organization.
• Establish the ISMS guidelines and policies, ensuring their integration with the other
processes of the organization and the Strategic Plan.
• Ensure compliance with information security policies, committing to ensure that
employees and contractors, under their charge, and interested parties know and
apply the established security controls.
• Assign the responsibilities associated with information security to other areas and
processes.
• Ensure that the internal audit program is executed, at least once a year, and that
corresponding improvements are made.
• Define the level of risk tolerance.
• Allocate the necessary resources for the effectiveness of the ISMS.
To establish, implement, operate, supervise, review, maintain and improve the ISMS, the
Committee must include the following actions within its functions:
• Evaluate and approve basic and specific information security policies; guaranteeing
its dissemination and application in the organization.
• Participate in decisions about information security architectures and solutions and its
continuity.
• Evaluate and approve Continuity Plans for the security of information that, in the
event of a critical situation, may be partially or totally threatened.
• Support the identification of the organization's critical processes, as well as analyze
and propose technological solutions that it requires.
• Generate and support socialization, awareness and knowledge transfer plans on
issues related to the ISMS.
Role design can be a group of areas that is basically how people organize themselves to achieve
better information security results. Each person understands their role in supporting the
process, as well as their responsibilities towards other team members to achieve common
objectives, encouraging the development of skills in an environment of continuous learning.
Serves as Leader of the Information Security Management System and is responsible for
planning, developing, controlling and managing the implementation and correct functioning of
the Information security model in line with the objectives and needs of DATALATINA and under
the guidelines of the Management Committee. It is also responsible for applying and
maintaining security standards in the computer resources under its responsibility, in accordance
with the DATALATINA information security model and under the authorization of the person
responsible for the corresponding information.
In effect, the Information Security Officer responds to the role of the ISMS Leader who is at a
high level to ensure compliance with security policies, therefore, he or she reports directly to
General Management.
Security of the information
Management
Committee (
Director )
ISMS Leader (
Executes )
ISMS
Operator
( Executes )
The Information Security Management System Operator is responsible for executing the
Operation Administration procedures in the security elements of security incidents and
vulnerabilities that occur in DATALATINA's information resources. Their function must be
aligned with the operation management process and for this company the Role is assigned to
the IT Engineer.
It is also responsible for executing operational procedures for identification, authentication and
access control in order to protect information assets, as well as updating systems in accordance
with the DATALATINA information security model.
Among the responsibilities and functions of the ISMS Leader and Operator, in light of the PHVA
cycle, are:
5. Carry out, together with the Process Leaders, the identification, assessment
and classification of information assets.
18. Propose, design and promote the continuous improvement of the information security
controls and tools necessary to strengthen information security in the organization and
the appropriate treatment of information security incidents detected.
The person responsible for the Information is defined as any employee, contractor or third party in
charge of clearly identifying the value of the information, knowing the risks to which it could be
exposed and ensuring that the necessary mechanisms are provided so that these risks are mitigated
to acceptable levels considering the cost-benefit ratio for your area.
Security of the information
o IT Management
1. You must apply the necessary controls that guarantee the availability, confidentiality and
integrity of the information of technological information assets and computer resources.
2. You must avoid unauthorized disclosure, modification, removal, destruction of information
stored on peripheral devices.
3. Must carry out the survey, update and maintenance of technology information assets.
4. You must authorize the creation or modification of DATALATINA access accounts or
resources.
5. You must make and maintain backup copies of the information in digital media.
6. You should ensure that antivirus software is installed that provides protection against
malicious code on all computing resources.
7. You must authorize the use of software licensed by DATALATINA.
8. IT personnel are the only ones authorized to make modifications or updates to technological
elements and resources, such as uncovering, adding, disconnecting, removing, reviewing
and/or repairing their components.
9. You must establish an authorization procedure and controls to protect access to data
networks and network resources.
10. You must establish a procedure that ensures the deactivation or blocking of access
privileges on technological resources, network services and information systems, when the
employee or user has been separated or has terminated the contract with DATALATINA.
11. You must establish a procedure that ensures the management of normal changes and
emergency at the level of infrastructure, applications and technological services.
Security of the information
12. You must establish a change committee, who will be in charge of evaluating, approving or
denying the implementation of the changes.
13. You must periodically plan activities that involve audits of the systems in production and
must guarantee that the documents, devices, and media used for audits of the Information
Systems are protected and guarded from unauthorized access.
14. You must document the results of the information systems audits.
15. Ensure that a backup copy of the asset information is made prior to its return and before
executing the secure erase procedure.
o Legal Advisor
1. Indicate to the ISMS Leader the statutory, regulatory, and contractual requirements relevant
to Datalatina's approach to information security.
2. You must verify the background of all candidates in accordance with relevant laws,
regulations and ethics, which must be proportionate to the requirements of the business,
the classification of the information to be accessed, and the perceived risks.
3. You must ensure that users who have access to confidential information sign a
confidentiality, copyright and/or data protection agreement, as applicable.
4. You must determine the necessary competencies of employees who perform work that
affects information security performance.
5. You must ensure that employees are competent, based on the required education, training
or experience.
6. It must evaluate employees in relation to information security performance, encourage the
taking of actions to acquire and/or strengthen the necessary competencies, and evaluate
the effectiveness of the actions taken.
Security of the information
7. You must file and safeguard employment histories, retaining appropriate documented
information as evidence of competency.
8. Must lead induction, re-induction, training and awareness programs focused on
strengthening awareness in relation to information security. 1
9. Must lead the activities required for the termination of contracts, ensuring relevant
information security aspects.
10. You must establish confidentiality or non-disclosure agreements to be applied to all
DATALATINA personnel.
11. You must identify, regularly review and document requirements for confidentiality or non-
disclosure agreements that reflect VALID CCOLOMBIA's needs for the protection of
information.
12. It must detail the activities for which employees can be monitored, in order not to violate
the right to privacy or the rights of the employee.
13. Guarantee that all employees accept and sign the confidentiality agreements determined by
DATALATINA, which express the obligation to protect the information from being revealed.
14. In conjunction with the General Management, apply the disciplinary procedure when cases
of non-compliance or violation of the information security policies are evident.
15. Employees must return all DATALATINA assets that are in their
power upon termination of your employment, contract or agreement.
Security of the information
and. Indication of high level of scope and limit at the physical level of ICT and
organization.
This policy will cover each of the software created by the company in which they were
contemplated when evaluating the information assets, as well as the license control of
the “Meycor” software in which the related policy processes will be worked on such as
For example, the access policy, in addition, the report established and agreed with senior
management will be carried out to control the infractions that are generated and
definitions of an improvement plan, the availability for the treatment of the information
and its effects will be a priority. assets so that they do not interfere with business
continuity and do not generate repression from clients for non-compliance. For this
reason, constant monitoring will be carried out on each hardware that has high priority
such as servers, clouds, repositories and among others without taking into account that it
is contracted. by a third party.
For employees, senior managers and clients, they will be governed based on what was
contemplated in the policy. If, upon being approved and implemented, it is necessary to
make modifications, these must be presented, analyzed and evaluated for
implementation in the form of an annex, carrying out due diligence. awareness plan or in
the improvement and maintenance of the policy that will be carried out annually
60
50 49%