Introduction: How To Use This Template: Information Security Charter
Introduction: How To Use This Template: Information Security Charter
To use this template, simply customize any text below in dark grey to fit the needs of your enterprise. Be sure to
remove all introductory text in dark grey and convert the remaining text to black prior to distribution. Also, replace
the header and footer with your enterprise’s information.
This document is intended for use as guidance and should be used in accordance with your enterprise’s legal and
compliance environment.
Security Vision
The purpose of documenting the security program’s vision is to ensure that the development and management of
your security policies meet the broader program vision.
It should be a concise statement that reflects your center, department, or committee’s overall goal, security-wise,
within the broader organization. The vision statement should answer the question “what will happen as a result of
what we do?”
Example: Info-Tech Holdings will be the group of companies that offers its employees and its clients a safe and
secure environment where data security is not a concern while fostering and not limiting innovation.
Security Mission
The purpose of documenting the security mission is to ensure that your suite of security policies is meeting the
entire security program’s mission.
It should be a concise statement that describes what will be delivered, offered, or achieved by your committee.
The mission answers the question “what do we do?” It defines the purpose and scope of the committee.
Example: To deliver a comprehensive suite of IT and information security governance and operations functions
on behalf of Info-Tech Holdings.
Security Scope
The purpose of documenting the charter’s scope is to define how far-reaching the charter is and what
departments must comply with it.
Edit the chart below to set an appropriate scope for your organization’s charter.
Organization (Business Technology
Physical Location(s) Data
Units/Processes) (IT Systems)
1
Info-Tech Research Group
Applications
Category management Head office Toronto Product database
Replenishment Satellite office New Accounting ERP
New business York information Replenishment
development (includes 300 stores across Sales data Budget planning
marketing, real estate) Canada Email EDI
Operations (store 150 stores across HR
Backend
management) US and Caribbean Financials
Corporate planning Data center (tape Shared server AD
Accounting (including backup, offsite) Common drive Exchange
loss prevention) SharePoint SharePoint
Treasury MS Link
Human Resources FTP
IT EFT
Design and
Network
construction
MPLS (includes
DSL)
VPN (direct access)
Example:
Adopt a risk-based approach to ensure that information security risks are treated in a consistent and
effective manner.
Mitigate information security risk to a manageable level that is accepted by the board.
Move from a reactive response model to a predictive model to identify risks before potential impact.
Business Strategic Goal #2: Provide customers with the highest level of service
Protect and prevent information (e.g. customer data) from unauthorized uses or disclosures.
2
Info-Tech Research Group
Ensure that information security is integrated into essential business activities.
Prioritize information security resources to protect the business applications where an information security
incident would have the greatest impact.
Business Strategic Goal #4: Meet the operating needs of the organization in a secure manner
Safeguard data at rest, in transit, and in use across on-premises and hosted systems.
Safeguard the confidentiality, integrity, and availability of the network, systems, and applications to the
levels required by the business.
Business Strategic Goal #5: Provide training and awareness to end users
Ensure that end-user training and awareness occurs regularly, takes a variety of forms, and spans various
lengths of time.
Test end users regularly to verify that training is effective.
Foster a security-positive culture that influences the behavior of end users to reduce the likelihood of
information security incidents occurring and limit their potential business impact.
Example:
CISO
Description Responsibilities
3
Info-Tech Research Group
o Development of policies and procedures
o Security architecture design
2. Approve security policies
Communicate business obligations and goals to support individuals
developing policies.
3. Develop security strategy and governance framework
In conjunction with business leaders, align the security objectives with
business goals to ensure security is a business enabler.
An information security risk 1. Identify risks associated with protecting information assets
officer consults, coordinates,
and partners with Legal and Collaborate with and support departments from an information security
relevant stakeholders to perspective.
develop enterprise-level Monitor compliance with policies.
information security Ensure privacy legislation is being adhered to.
compliance policies. Primary
Implement security controls and solutions according to security
concerns include risk
governance requirements such as:
identification, management,
o Auditing
and mitigation processes as
o Development of policies and procedures
well as monitoring and
tracking audit findings across
the organization. 2. Align information security policies to enterprise policies
4
Info-Tech Research Group
Track and record information security risks, detailing if the risk is
accepted, not accepted, mitigated, or transferred.
6. Risk identification
Identify, assess, and monitor risks to information security and propose
mitigation strategies.
Evaluate the inherent risk of identified threats and calculate the residual
risk after mitigation technique(s) have been implemented.
Security Analyst
Description Responsibilities
A security analyst’s role 1. Maintain and ensure execution of security operational standards, such
focuses on implementing as:
security measures.
System hardening
Patching
Provisioning and deprovisioning of systems and access
Decommissioning of technical assets
Manage security devices (internal & external): configure, update, and
tune.
2. Know what is happening in the environment: real-time security
monitoring/detection
Monitor the organization’s IT systems and end users’ activities from an
information security perspective.
Correlate and analyze logs to detect potential information security
5
Info-Tech Research Group
breaches, and perform other activities needed to support the threat
intelligence program.
3. Know what actions need to be taken based on this information:
Security incident management
Security problem management
Reporting
Auditing response
Forensics
4. Deploy and maintain proactive security measures, such as:
Antivirus
Firewalls
Encryption
5. Contribute to incident reports
Work with the incident response team by providing necessary details
of security incidents.
6. Conduct penetration and security awareness testing
Test the strength of organization’s security via common attack
techniques.
Test end-user awareness through mock phishing emails and other
appropriate techniques.
Executive Team
Description Responsibilities
Patching
5. Addressing the public after a severe security incident
Responsible for media appearances following particularly serious
security incidents affecting external stakeholders (e.g. cases in which a
PR specialist alone would be insufficient).
6
Info-Tech Research Group
End Users
Description Responsibilities
Example:
GDPR
PCI DSS
Example:
ISO 27001
Example:
[Organization] defines its risk tolerance as [moderate]. This means that we accept the risks within our industry
needed to conduct business. We use various controls to mitigate these necessary risks but do not impose
controls so strict that business operations are significantly impeded in the name of security. However, this position
should not be misunderstood as one of laxness. [Organization] takes organizational security very seriously and
expects all employees to respect the security controls established through our governance framework and overall
security strategy.
7
Info-Tech Research Group
program (e.g. review security strategies, communicate security issues to public investors), and how they are
being tracked on their commitment levels.
Example:
The Board of Directors (“the Board”) is ultimately accountable for corporate governance, which includes
information security as an integral part of it. The Board is committed to ensuring security controls are protecting
and securing all organizational systems and any sensitive, valuable, or confidential data. The Board will review
security strategies and budget requests as an agenda item for each Board meeting.
Board Sign-Off:
Have your board members add their name and title below, then sign and date the lines provided.
The Charter shall be evaluated when major organizational or environmental changes occur. Such changes may
result in the need to update or otherwise change the existing version of the Charter, which will be done after the
evaluation process is complete.
Organizational and environmental changes resulting in Charter review and evaluation include but are not limited
to:
New CISO, CIO, or CEO
Change in regulatory or legal environment
Dramatic changes om end-user behavior
Change in organizational goals
Change in organizational operating environment
Revision History
Version Change Author Date of Change
8
Info-Tech Research Group
_____________________________________________________
For acceptable use of this template, refer to Info-Tech's Terms of Use. These documents are intended to supply
general information only, not specific professional or personal advice, and are not intended to be used as a
substitute for any kind of professional advice. Use this document either in whole or in part as a basis and guide for
document creation. To customize this document with corporate marks and titles, simply replace the Info-Tech
information in the Header and Footer fields of this document.
9
Info-Tech Research Group