Information Security Governance Papers

Paper Title Lack of progress is due in part to the absence of a governance framework
The Abstract of The Paper With such a broad consensus on the kinds of measures that need to be taken to secure our information systems, why haven’t we made more progress? The conclusion of the BSA task force is that we are still missing a vital piece of the puzzle -- an information security governance framework that private industry can readily adopt. Governance entails the systematic oversight and execution of information security functions. As a result, it operationalizes the information security effort. By themselves, recommended practices – no matter how strong the consensus is for them – are not enough; they must be married with an information security governance framework that assures effective implementation. What many of the reports on information security overlook is that a well-developed information security governance framework already exists in the form of the Federal Information Security Management Act (FISMA). This framework was developed for the Federal government. While overly detailed for the private sector, its principles can be applied to all organizations. It is especially good at defining the people and process aspects of information security governance, which is exactly where many of the reports on this topic fall short.

Purpose of a Governance Framework

A governance framework is important because it provides a roadmap for the implementation, evaluation and improvement of information security practices. An organization that builds such a framework can use it to articulate goals and drive ownership of them, evaluate information security over time, and determine the need for additional measures. One of the most important features of a governance framework is that it defines the roles of different members of an organization. By specifying who does what, it allows organizations to assign specific tasks and responsibilities. A common element in almost all security best practices is the need for the support of senior management, but few documents clarify how that support is to be given.

Fortunately, FISMA does. Adapting the FISMA management framework to the private sector provides the missing link to industry’s information security efforts. FISMA divides management functions into four categories, which, translated into business terms, are the following: 1) CEO, 2) business unit heads, 3) senior managers, and 4) the CIO/CISO. The security governance role of each is described below:

The CEO (or most senior executives who report to the board of directors) has responsibility for
! Oversight and coordination of policies
6
! Oversight of business unit compliance
! Compliance reporting
! Actions to enforce accountability
The business unit head (or executives with bottom-line responsibilities) has responsibility for
! Providing information security protection commensurate with the risk and
business impact
! Providing security training
! Developing the controls environment and activities
! Reporting on effectiveness of policies, procedures and practices

The senior manager (those reporting to the business units heads) has responsibility for
! Providing security for information and systems
! Periodically assessing assets and their associated risks
! Determining appropriate levels of security for the information in their systems
! Implementing policies and procedures to cost-effectively reduce risk to acceptable

levels
! Periodically testing security and controls
The CIO and/or CISO (or most senior manager with IT security responsibilities) has responsibility for
! Developing, maintaining, and ensuring compliance to the security program
! Designating a security officer with primary duties and training in IT security
! Developing the required policies to support the security program and business

unit specific needs
! Developing the information use and categorization plan
! Assisting senior managers with their security responsibilities
! Conducting security awareness program
The Components of a Security Governance Framework

FISMA also specifies the core components required in a security program, as do many other
documents, including ISO/IEC 17799. To be effective, however, each information security
program must be tailored to the needs of the individual business and industry in which it operates.
What is needed is a framework that specifies what corporate executives, business unit heads, senior managers, and CIOs/CISOs should do; that identifies business drivers, clarifies roles and responsibilities, recognizes commonalities and defines metrics; and that is flexible enough to apply to different business models.

We have provided the beginnings of such a framework below in a brief but comprehensive chart. (See below.) The horizontal axis identifies different management levels. The vertical axis identifies the business drivers, responsibilities, and metrics. It is important to note that the first and third criteria on the vertical axis (Governance/Business Drivers and Metrics/Audit) are specific to individual businesses and will change according to individual business and industry needs. For example, the governance and business drivers for the financial sector will likely differ from those of the health care industry as will the metrics used to calibrate their results. By contrast, the middle item (roles and responsibilities) is common to almost all businesses and thus can be widely applied.

The task force identified that considerable additional work is needed to develop useful metrics that enable managers to quantify the return on investments in information security and the effectiveness of information security programs and measures. Several public and private sector organizations are investigating this field. The task force looks forward to the products of those efforts.
Web Link http://www.bsa.org/country/Research%20and%20Statistics/~/media/BD05BC8FF0F04CBD9D76460B4BED0E67.ashx

Back To Information Security Governance Papers List

Database Sections