The need for IT security is mostly driven by external factors and specific incidents rather than management’s desire to leverage IT security for business objectives and this often conflicts with operational spending investments.
Consultants who work with IT security audits often are a valuable resource regarding the general state of IT security. They work for a number of clients in various industries over a number of years and therefore get a perception of the general state of things such as IT security awareness. I’m one of those consultants and I believe I have some observations on this issue. While speaking of none of my clients in particular the need for IT security is mostly driven by external factors and specific incidents rather than management’s desire to leverage IT security for business objectives. For instance, new legislation and directives from the EU and the US have pushed the adoption of Information Security Standards such as ISO/IEC 27001 and PCI DSS. These increased expectations are forcing organizations to spend money and resources to implement the applicable standards, because of the new laws and directives. Given the choice, more often than not, organizations would choose to spend the investment elsewhere expecting a better return.
Another example that we are reading about in the news on a regular basis, is the hacker security breach, which has affected some major companies, such as Target retail stores, eBay and very recently Apple’s iCloud. Besides the Brand management damage control caused by a major security event and the possible discipline for the IT or security personnel, a major security event often jars the management team into adopting an IT control framework such as ISO 27001. That is like management allocating resources to buy fire insurance only after the need presents itself when the Headquarters burns down. In other words the need for IT security is not proactive but reactive, driven by external factors rather than the prudent management of IT resources.
The Certified Information Systems Auditor Review Manual provides the following definition of risk management:
“Risk management is the process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives, and deciding what countermeasures, if any, to take in reducing risk to an acceptable level, based on the value of the information resource to the organization.”
While doing consulting work for companies certified or in the process of adopting a control framework to manage IT security, I have reviewed a number of Risk assessments and BCM plans. RAs and BCPs are part of any modern control framework for ISMS, but the practical application of these required controls takes many forms. Often many of these risk assessments are created to present an existence of the identification process, rather than the practical use of an effective risk management system.
Three critical elements of efficient IT / information security risk assessments:
While this does not seem like rocket science, as a consultant I’ve seen every conceivable permutation of the above. Generally small to medium enterprises should begin by organizing an inventory of 10-20 critical IT assets/processes, the risks associated with the critical assets/processes, and the controls assigned to mitigate the identified risks. Risk assessments attempting to manage hundreds of assets and the associated risks, usually become unmanageable and the review or pro forma of such complex risk assessments is tremendously overwhelming.
My experiences aren’t always bad. I have also seen very good risk assessments strategies and I know that, basically, this is just a matter of knowledge. Understanding how to stop the bad things from happening by figuring out what can happen and knowing how to prevent or react to the situations will be the best course of action. Usually, spreading the knowledge by informing those persons, who can directly impact the situations on a daily basis, what to do and how to do it properly is a major step in the right direction.
This brings us to the question of how to enhance IT security with the help of people maintaining IT. I find that the most common stumbling blocks are:
This article was designed to present an all too common problem many organizations are encountering, while establishing an effective ISMS and risk mitigation strategy. Although most aspects of IT Security are obvious, the implementation of the proper processes, procedures and controls, as well as the collective belief in the strategy, are very difficult to collective execute across an organization.