CISM Domain 1 V 5
CISM Domain 1 V 5
CISM Domain 1 V 5
01 CISM Exam
02
02 How to approach
03 Course overview
04
04 Training deliverables
S.Srinivasan
+91 96770 38871
www.sspacademy.org
3
Each question contains the body of the question and 4 answer choices.
The candidates are required to select one “Correct” or “Best” answer
02
EXAMINATIO
N Exam questions are application oriented. The candidates are expected
to apply the knowledge learned in practice and studies to solve the
03 questions
Read each question carefully. Eliminate known incorrect answers. Make the “Best” choice possible.
01 Do not look for correctness in every case
Identify key phrase in each question like “MOST”, “BEST”, “FIRST”, “PRIMARILY” etc., before
02 selecting and recording the answer.
03 Answer all questions. There are no negative marks for wrong answers.
5. Which of the following is MOST helpful to developing a comprehensive Information security strategy?
E. Performing a business impact analysts (BIA).
Sample F. Conducting a risk assessment
G. Adopting an industry framework
Questio H. Gathering business objectives
ns
6. A business unit is preparing the business case for acquiring an e-commerce solution. Which of the
following should be provided by the information security manager?
I. A cost-benefit analysis of the solution to be acquired
J. An analysis of the solution's security requirements
K. Information security staff training requirements to support the solution
L. A return on investment (ROI) assessment of the solution to be acquired
Exam scoring and report
01 Only correct answers are scored. The candidates scores are reported as scaled score. A scaled score
is a conversion of candidate’s raw score to a common scale
The grading is between 200 and 800. To pass a candidate should obtain minimum of 450 or above
02
03 At the completion of the exam, preliminary results will flash in the screen. The official scores will
be sent with domain wise grades scored with in 14 days of exam date.
How to get certified?
Submit an application (within five years of the exam passing date) with verified evidence of a
02 minimum of at least five years of cumulative work experience performing the tasks of a CISM
professional. For more information visit ISACA website www.isaca.org
24%
Domain 4 Domain 2
27%
Domain 1
• Ensure that the CISM Candidate has the knowledge necessary to:
– Understand the purpose of information security governance, what it
consists of, and how to accomplish it.
– Understand the purpose of an information security strategy, its objectives
and the reasons and steps required to develop one.
Objectives – Understand the meaning, content, creation and use of policies, standards,
procedures and guidelines and how they relate to each other.
– Develop business cases and gain commitment from senior leadership.
– Define governance metrics requirements, selection and creation.
Governance Vs Management
Task Statements
• T1.1 Establish and/or maintain an information security strategy in alignment with organizational
goals and objectives to guide the establishment and/or ongoing management of the information
Information Security Governance
security program.
• T1.2 Establish and/or maintain an information security governance framework to guide activities
that support the information security strategy.
• T1.3 Integrate information security governance into corporate governance to ensure that
organizational goals and objectives are supported by the information security program.
• T1.4 Establish and maintain information security policies to guide the development of standards,
procedures and guidelines in alignment with enterprise goals and objectives.
• T1.5 Develop business cases to support investments in information security.
15
Task Statements
• T1.6 Identify internal and external influences to the organization (e.g., emerging technologies, social media,
business environment, risk tolerance, regulatory requirements, third-party considerations, threat landscape) to
Information Security Governance
ensure that these factors are continually addressed by the information security strategy.
• T1.7 Gain ongoing commitment from senior leadership and other stakeholders to support the successful
implementation of the information security strategy.
• T1.8 Define, communicate and monitor information security responsibilities throughout the organization (e.g.,
data owners, data custodians, end users, privileged or high-risk users) and lines of authority.
• T1.9 Establish, monitor, evaluate and report key information security metrics to provide management with
accurate and meaningful information regarding the effectiveness of the information security strategy.
Introduction
• The first step in establishing information security governance is senior management determining the
outcomes it wants from the information security program.
• This is the result of information risk management and the levels of acceptable risk.
• The outcomes and levels of acceptable risk should be determined and used to set control objectives.
• For information security to effectively address adequate protection for information assets, an
Information Security Governance
• Keeps risks with in acceptable level • This strategy documents the goals and
improvements program
• Changes with the organization • This forms the basis of the information
security governance.
The desired
state
• The levels of acceptable risk as defined by the management is often defined as “Risk appetite”
• This forms the desired state the information system security program should achieve.
• Thus the strategy is to develop a set of programs that runs the security requirement in achieving the
Information Security Governance
• Providing the structure and framework to optimize allocations of limited security resources
• Providing a level of assurance that critical decisions are not based on faulty information
• Providing a firm foundation for efficient and effective risk management, process improvement,
rapid incident response and continuity management
• Providing greater confidence in interactions with trading partners
• Improving trust in customer relationships
• Protecting the organization’s reputation
• Enabling new and better ways to process electronic transactions
• Providing accountability for safeguarding information during critical business activities, such
as mergers and acquisitions, business process recovery, and regulatory response
• Effective management of information security resources
• Aligning information security with business strategy to support organizational
objectives such as:
• Security requirements driven by enterprise requirements that are
thoroughly developed to provide guidance on what must be done and a
• Information security governance is the responsibility of the board of directors and senior
management.
Information Security Governance
• It must be an integral and transparent part of enterprise governance and complement or encompass
the IT governance framework
• Boards of directors will be required to make information security an intrinsic part of governance
• This includes monitoring and reporting processes to ensure that governance processes are effective
and compliance enforcement is sufficient to reduce risk to acceptable levels.
• effective information security governance is required to address legal and regulatory requirements
and is becoming mandatory in the exercise of due care
Governance and Business Goals and Objectives
• Corporate governance is the set of responsibilities and practices exercised by the board and
senior management with the goals of:
– providing strategic direction,
Information Security Governance
• Risk capacity: Amount of loss an enterprise can tolerate without its continued existence being questioned.
• Risk appetite: The amount of risk that an entity is willing to accept in pursuit of its mission.
Risk Appetite
• Risk appetite is an essential element for virtually all aspects of information security as well as
most other aspects of organizational activities.
Information Security Governance
• It will determine many aspects of strategy including control objectives, control implementation,
baseline security, cost-benefit calculations, risk management options, severity criteria
determinations, required incident response capabilities, insurance requirements and feasibility
assessments, among others.
• Risk appetite is translated into a number of standards and policies to contain the risk level within
the boundaries set by the risk appetite.
• These boundaries need to be regularly adjusted or confirmed.
Risk Acceptance
• Risk acceptance is a formal and explicit process that affirms that the risk requires and warrants no additional
response by the organization as long as it and the risk environment stay substantially the same and
Information Security Governance
• Information security deals with all aspects of information, in any medium (e.g., written, spoken,
electronic), regardless of whether it is being created, viewed, transported, stored or disposed.
• IT security is concerned with security of information within the boundaries of the technology
Information Security Governance
• The BMIS model uses systems thinking to clarify complex relationships within the enterprise to more
effectively manage security.
• BMIS provides the context for frameworks such as CoBIT.
• BMIS is best viewed as a flexible, three-dimensional, pyramid-shaped structure made up of four elements
Information Security Governance
– Governance
– Culture
– Enablement and Support
– Emergence
– Human Factors
– Architecture
The Assurance Process - Convergence
• The assurance function is traditionally segmented to treat security in silo’s. Thus there are
separate assurance functions for Operations, IT, Governance, Finance, HR etc., to name a few.
• With almost end to end automation now a days, the necessity is felt to converge the assurance
function as the auditee also feels the stress in answering many audit requirements.
Information Security Governance
• Information security is back bone of all the security related initiatives. Of course information
security cannot be achieved by only looking at technical controls. Physical and environmental
control also plays a vital role in securing information processing assets.
Information Security Governance
Tracking Roles
Practice Question
• Business goals define the strategic direction of the organization. Functional goals define the
tactical direction of a business function. Security goals define the security direction of the
organization. What is the MOST important relationship between these concepts?
A. Functional goals should be derived from security goals.
Information Security Governance
• Board of Directors
– Need to be aware of information assets
– Provided with high-level results of risk assessments and BIAs.
– Exercise due care in protecting key assets
Information Security Governance
• Steering committee
– Comprised of senior representatives of groups impacted by information security
– Ensures alignment of security program with business objectives
• Common topics:
– Security strategy and integration efforts
– Specific actions and progress related to business unit support of information security program
functions
– Emerging risk, business unit security practices and compliance issues
Roles and Responsibilities
• Senior Management
– Ensure needed functions/resources are available
– Ensure resources are properly utilized
Information Security Governance
• In many cases the support from Senior Management may not be visible, because they may not
be able to understand and appreciate the importance of Information security. In those
situations, the CISO should ensure adequate trainings and workshops to the senior managers to
make them understand the importance of the program.
Information Security Governance
• In other cases, support for information security programs may be limited for financial or other
reasons. The information security manager must recognize these constraints, prioritizing and
maximizing the effects of available resources in addition to working with management to
develop additional resources.
The Business Case
• Should have enough detail to explain the why of a project and what it will deliver back.
• Provides the information required for an organization to decide whether a project should proceed.
• The essential consideration is the value proposition, or the cost-benefit analysis of moving forward
with the project
Preparing a Business Case
system or software product is working correctly, some minor modifications are needed, or a
complete upgrade or replacement is required. At this point in the process, the strengths and
weaknesses of the current system or software product are identified.
– Requirements are defined based on stakeholder needs and constraints. Defining requirements for
software differs from defining requirements for systems.
– Recommended approach is the recommended system and/or software solution to satisfy the
requirements. This step clearly identifies the alternatives that were considered and the rationale as
to why the preferred solution was selected. This is the process wherein the use of existing structures
and commercial alternatives are considered (e.g., “build versus buy” decisions).
Preparing a Business Case
• Elements of a feasibility study (contd…)
– Evaluation is based on the previously completed elements within the feasibility study. The final report
addresses the cost-effectiveness of the approach selected or the value proposition. Elements of the final
report include:
• The estimated total cost of the project if the preferred solution is selected, along with the alternates
Information Security Governance
• The formal presentation to senior management is used as a means to educate and communicate key
aspects of the overall security program. Key points include:
– Aligning security objectives with business objectives, enabling senior management to
Information Security Governance
• To ensure effective and efficient implementation of Information Security Program, proper communication
channels should be established.
• This should include consistent and reliable reporting from various parts of the organization.
Information Security Governance
• These along with along with other metrics serve as the early warning system for potential threats and emerging
security issues.
• Communication channels may be formal or informal.
• Periodic presentation to the senior management is necessary to make them understand the state of the
information security program.
Communication Channels
– Identifying the weakest security links in the organization and potential consequences of compromise
– Performance measurement data analysis supported with independent, external assessment or audit reports,
if available
– Addressing ongoing alignment for critical business objectives, operation processes or corporate
environments
– Requiring the approval for renewed plans, as well as related budget items
Communication Channels
• In addition to the formal presentations, four other groups needs different communications:
• Senior management
– Attend business strategy meetings to become more aware and understand the updated business
Information Security Governance
• Other management
– Inform line managers, supervisors and department heads charged with various security and
risk management-related functions, including ensuring adequate security requirement
awareness and policy compliance, of their responsibilities.
Information Security Governance
• Employees
– Offer timely training and education programs.
– Initiate a centralized on-board training program for new hires.
– Distribute organizational education material on updated strategies and policies.
– Instruct personnel to access the intranet or email-based notifications for periodic reminders
or ad hoc adaptations.
– Support senior management and business process owners by assigning an information
security governance coordinator within each functional unit to obtain accurate feedback of
daily practices in a timely manner.
Governance of Third Party Relationships
Metrics allow the measurement of the achievement of a process goal. Security metrics should tell us
about the state or degree of security relative to a reference point.
It is important to keep in mind that technical metrics are only useful for the tactical operational
Information Security Governance
management of technical security systems, such as intrusion detection systems, proxy servers,
firewalls, etc. They say nothing about strategic alignment or governance.
Metrics and Measurement
From a management perspective, technical metrics cannot provide answers to questions such as:
• How secure is the organization?
• How much security is enough?
• How do we know when we have achieved an adequate level of security?
Information Security Governance
– Attainable
– Relevant
– Timely
• Avoid measuring something simply because it can be measured.
Practice Questions
• "Sensitive data must be protected to prevent loss, theft, unauthorized access and/or unauthorized disclosure" is a
statement that would MOST likely be found in a:
• A. guideline.
• B. policy.
•
Information Security Governance
C. procedure.
• D. standard.
Practice Questions
• The PRIMARY objective for information security program development should be:
• A. creating an information security strategy.
• B. establishing incident response procedures.
• C. implementing cost-effective security solutions.
Information Security Governance
• The objective of the security strategy is the desired state defined by business and security attributes.
• The strategy provides the basis for an action plan composed of one or more security programs that, as
implemented, achieve the security objectives.
• The action plan(s) must be formulated based on available resources and constraints, including
Information Security Governance
• Confirmation bias—Seeking opinions and facts that support one’s own beliefs
• Selective recall—Remembering only facts and experiences that reinforce current assumptions
• Biased assimilation—Accepting only facts that support an individual’s current position or
perspective
Information Security Governance
• Biased evaluation—Easy acceptance of evidence that supports their one’s hypotheses while
contradictory evidence is challenged and, almost invariably, rejected. Critics are often charged
with hostile motives or their competence is impugned.
• Groupthink—Pressure for agreement in team-based cultures
Information Security Strategy Objectives
• The objectives of developing an information security strategy must be defined and metrics developed to
determine if those objectives are being achieved. Typically, the six defined outcomes of security governance
will provide high-level guidance. The six outcomes are:
– Strategic alignment
Information Security Governance
• Criticality of data can be derived from criticality of processes that use that data.
• Sensitivity can be derived by determining consequences of data leakage.
– Sensitivity of data may be subjective.
– Certain types of data may be considered
sensitive by law or regulation.
– Valuation of data may be qualitative or quantitative.
– Business dependency analysis can be used as an indication of value
Current Vs Desired State
• Desired State
– Ideal information security environment
– Frameworks/standards helpful to identify outcomes
– Defined desired state makes it easier to identify path from current state
Information Security Governance
– Risk objectives such as risk appetite and risk tolerance and the organization’s risk culture
• Current State
– What is actually occurring
– Help to identify where the environment falls short of the desired
– Business Impact Analysis can be used a tool to determine the current state
Building the Strategy
• Strategy provides a road map to move from the current state to the desired state
• Path could be long depending on distance between current and desired state
• Should identify:
– Available resources
Information Security Governance
– Available methods
– Constraints
Resources
• Policies • Training
• Standards • Awareness and Education
• Procedures • Audits
• Guidelines • Compliance enforcement
• Architecture(s) • Threat assessment
Information Security Governance
• Legal
• Physical
• Ethics
Information Security Governance
• Culture
• Costs
• Personnel
• Organizational structure
• Resources
• Capabilities
• Time
• Risk appetite
Legal and Regulatory Requirements
• There are a number of legal and regulatory issues affecting information security that must be
considered in developing a strategy.
• Information security is inevitably intertwined with questions of privacy; intellectual property; and
contractual, civil and criminal law. Any effort to design and implement an effective information
Information Security Governance
security strategy must be built on a solid understanding of the pertinent legal requirements and
restrictions.
• Different regions in a global organization may be governed by conflicting legislation. An example of
this is in the area of privacy legislation, where different cultures place different degrees of importance
on privacy.
Legal and Regulatory Requirements
• The global organization may need to establish different security strategies for each regional division,
or it can base policy on the most restrictive requirements to be consistent across the enterprise.
• From the perspective of the information security manager, regulatory compliance should be treated as
any other risk and the extent of compliance is ultimately a business decision that must be made by
Information Security Governance
• Two main aspects an information security strategy must take into consideration regarding the content
and retention of business records and compliance:
– The business requirements for business records
– The legal and regulatory requirements for records
Information Security Governance
• Depending upon an organization’s location and industry, regulatory bodies have requirements that an
organization must comply with, including legal, medical and tax records.
E-discovery
• Civil and criminal actions rely on evidence obtained from email and other electronic communications
in response to a production request or subpoena. If information has been archived without being
classified and cataloged, retrieving the required material can be an arduous and expensive task
• Generally, the best option is to have a policy that requires destruction of any data not required to be
retained by law or for specific business reasons.
Physical Constraints
• Personnel
– Resistance to changes can impact the success of strategy implementation
Information Security Governance
• Organizational structure
– Impacts how a governance strategy can be implemented
– Cooperation is needed
– Senior management buy-in helps to ensure cooperation
Resources Capabilities and Time
• Resources
– Consider available budgets, TCO and personnel requirements
Information Security Governance
• Capabilities
– Expertise and skills
• Time
– Deadlines/Windows of opportunity
Risk Appetite
Ongoing Assessment
• It is essential for the board of directors to be involved with information security activities
primarily because of concerns regarding:
• A. technology.
Information Security Governance
• B. liability.
• C. compliance.
• D. strategy.
Practice question
• The FIRST step to create an internal culture that embraces information security is to:
• A. implement stronger controls.
• B. conduct periodic awareness training.
Information Security Governance
• Ensure an organization can continue operations even if regular staff are unavailable
Guidelines
• Contain information that will be helpful in executing procedures
• Enable use of individual judgment
• Can be helpful when an outcome needs to be achieved, but the how does not matter
Framework and Architecture
• The approach for EA, including security, that has gained ground during the past decade is TOGAF,
which addresses the following four interrelated areas of specialization called architecture domains:
– Business architecture, which defines the business strategy, governance, organization and key
business processes of the organization
– Applications architecture, which provides a blueprint for the individual application systems to be
deployed, the interactions among the application systems, and their relationships to the core
Information Security Governance
business processes of the organization with the frameworks for services to be exposed as business
functions for integration
– Data architecture, which describes the structure of an organization’s logical and physical data assets
and the associated data management resources
– Technical architecture, or technology architecture, which describes the hardware, software and
network infrastructure needed to support the deployment of core, mission-critical applications
Framework
• The framework details the organization, roles, entities and relationships that exist, or should exist,
to perform a set of business processes.
• The framework should provide a rigorous taxonomy that clearly identifies what processes a
Information Security Governance
business performs and detailed information about how those processes are executed and secured.
• The end product is a set of artifacts that describe, in varying degrees of detail, exactly what and
how a business operates and what security controls are required.
• There are many resources available. One of the best known framework is COBIT 2019.
• Integration ensures consistency.
• When adding information security to an existing governance structure, it is not necessary to use a
different framework.
• If no general framework is used, find a framework that is comprehensive and can be used across
the organization
Controls
Controls are the primary components to consider when developing an information security strategy. Controls can be physical,
technical or procedural. The choice of controls must be based on a number of considerations including ensuring their
effectiveness, their cost or potential restriction to business activities, and their optimal form of control.
Non-IT Controls
The information security manager must be aware that information security controls must be developed for non-IT-related
Information Security Governance
information processes as well. This will include secure marking, handling and storage requirements for physical information
and considerations for handling and preventing social engineering. Environmental controls must also be taken into account so
otherwise secure systems are not subject to simply being stolen
Countermeasures
Countermeasures are the protection measures that directly reduce a vulnerability or a threat. Countermeasures can simply be
considered targeted controls.
Layered Defences
Layering defenses, or defense in depth, is an important concept in designing an effective information security strategy or
architecture. The layers must be designed so that the cause of failure of one layer does not also cause failure of the next layer.
Practice Question
• It is MOST important that information security architecture be aligned with which of the following?
• A. Industry good practices
• B. Business goals and objectives
Information Security Governance
Which of the following is the PRIMARY reason to change policies during program development?
A. The policies must comply with new regulatory and legal mandates.
B. Appropriate security baselines are no longer set in the policies.
Information Security Governance
• Appropriate email policies that inform employee that emails are not private may be inspected should
be communicated to the staff and where ever necessary, emails should be inspected.
• Legal protections vary on this type of monitoring and it is the responsibility of the information
security officer to understand the legal requirements of the jurisdiction involved.
Organization Structure
• Whatever may be the structure, the responsibilities and objectives will remain same as they must
be:
– Be closely aligned with the business objectives
– Be sponsored and approved by senior management
Information Security Governance
• Employee Skills:
– Strategy must be chosen that utilizes the existing skills within an organization for better
chances of success.
– Proficiency testing may be useful to determine if the requisite skills are available or can be
achieved through training.
Awareness and Education
regulatory exposures.
• Vulnerability assessments must be done holistically at an entity level covering all types of
exposures.
Risk Assessment and Management
• Conducting a threat and vulnerability assessment alone is not sufficient to have a comprehensive
infosec strategy
• Formally assessing risk is accomplished by first determining the viable threats to information
Information Security Governance
• The consequences are typically reduced to financial impacts. Risk that cannot result in an appreciable
impact is not important.
• BIAs are an important component of developing a strategy that addresses potential adverse impacts to
the organization.
• A BIA must also be considered as a requirement to determine the criticality and sensitivity of systems
and information.
• Thus it will provide the basis for developing an approach to information classification and addressing
business continuity requirements.
Outsourcing service providers
• From an information security point of view, outsourcing arrangements can present risk that may be
difficult to quantify and potentially difficult to mitigate.
• Providers may operate on different standards and can be difficult to control.
• The security strategy should consider outsourced security services carefully to ensure that they either
Information Security Governance
are not a critical single point of failure or there is a viable backup plan in the event of service provider
failure.
• Risk posed by outsourcing can also materialize as the result of mergers and acquisitions.
End of Domain 1