Cobit and Iso 27001
Cobit and Iso 27001
ISO 27000
Dr. Hale
University of Nebraska at Omaha
Information Security and Policy– Lecture 6
Today’s topics:
Last Time recap: FISMA related docs
IS27000 Series
slides from 2013 Jones and Bartlett Learning, LLC
slides from 2007 Luděk Novák, CISA, CISSP
ISO Assessment tool
CoBIT: Control Objectives for Information and related Technology
slides from 2007 IT Governance Institute
slides from 2013 Jones and Bartlett Learning, LLC
ISO 27000 related slides
Policy Frameworks
ISO/IEC 27000
Policy Frameworks
Overview of Documents
Policy Frameworks
ISO/IEC 27000 family review
ISMS Requirements
Risk management ISO/IEC 27001:2005
BS 7799-3:2006 (BS 7799-2:2002) ISMS Measurement
ISO/IEC 27005:2007 ISO/IEC 27004:2008
(ISO/IEC TR 13335-3:1998) Annex A
Policy Frameworks
ISO/IEC 27001:2013 principles
• Definition of requirements on Information Security Management System (ISMS)
• Information security management process based on PDCA Model
– Plan – Do – Check – Act
• Ensure the selection of adequate and proportionate security controls that protect
information assets and give confidence to interested parties
• All defined requirements are mandatory and it is not possible to exclude anyone
– But it is not necessary to implement all security controls !!!
Plan
Requirements Requirements
Customers
Suppliers
Do Act
Satisfaction Satisfaction
Check
Policy Frameworks
ISMS Measurement as a feedback
Business needs
Risk Indicators
management Define
measurement
priorities
Policy Frameworks
Examples of ISMS metrics
• Percentage (%) of system users/security personnel that have received basic
awareness training
• Average frequency of audit records review and analyses for inappropriate activity
• Percentage of systems using automated mechanisms to conduct analysis and
reporting of inappropriate activities
• Percentage (%) of systems that are compliant with the baseline configuration
• Percentage (%) of systems successfully addressed in the testing of the contingency
plan
• Percentage of accounts not associated with specific users
• Percentage (%) of system components that undergo maintenance on schedule
• Cost of information security incidents of unauthorized access to information systems,
due to physical security failures
• Percentage (%) of employees who signed acknowledgement that they have read and
understood rules of behavior, before being authorized access to the information
system
Source: NIST SP 800-80 Guide for Developing Performance Metrics for Information Security (draft)
http://csrc.nist.gov/publications/drafts/draft-sp800-80-ipd.pdf
Policy Frameworks
CMM® Security
ISO/IEC 21827 – Systems
Security Engineering –
Capability Maturity Model
(SSE-CMM®)
• Capability model for security
• Advantage: more levels to
compare security enforcement
[GOTO ISO 27001 control documents]
Policy Frameworks
Some slides from 2013 Jones and Bartlett, modified by MLH 2015-2017
Policy Frameworks
ISO/IEC 27002 (2015)
Policy Frameworks
ISO/IEC 27002 (2015)
Policy Frameworks
(next slides from 2007 IT governance institute, modified by mlh 2015)
Policy Frameworks
The Need for IT Governance
T
MEN
• Ensuring that objectives are achieved
FO R
M A N R IS K
A GE
www.itgi.org • Ascertaining that risks are managed
MAN NT
www.itgi.org
appropriately
E
CE
RESOURCE
• Verifying that the enterprise’s resources are
MANAGEMENT used responsibly
IT governance is:
• The responsibility of the board of directors and
IC
executive management
V
T EG N T DE AL
RA M
E LI U E
VE • An integral part of enterprise governance,
S T IG N RY
AL
consisting of the leadership, organisational
structures and processes that ensure that the
enterprise’s IT sustains and extends the
organisation’s strategies and objectives
PER SU R EM
MEA
T
MEN
FO R
M A N R IS K
A GE
www.itgi.org
MAN NT
www.itgi.org
E
CE
Source: Surveys by PwC for the IT Governance Institute Sep-Oct 2003 and Sep-Oct 2005
¤ Performance Performance
• Improving profitability, efficiency,
effectiveness, growth, etc. Conformance
Is about executing the value proposition throughout the delivery cycle, ensuring
Value delivery that IT delivers the promised benefits against the strategy, concentrating on
optimising costs and proving the intrinsic value of IT
Resource Is about the optimal investment in, and the proper management of, critical
IT resources: applications, information, infrastructure and people. Key
management issues relate to the optimisation of knowledge and infrastructure.
Board and Set direction for IT, monitor results and insist on corrective
measures
executive
Defines business requirements for IT and ensures that
Business management value is delivered and risks are managed
COBIT helps bridge the gaps between business risks, control needs and technical
issues. It provides good practices across a domain and process framework and presents
activities in a manageable and logical structure.
COBIT:
¤ Starts from business requirements
¤ Is process-oriented, organising IT activities into a generally
accepted process model
¤ Identifies the major IT resources to be leveraged
¤ Defines the management control objectives to be considered
¤ Incorporates major international standards
¤ Has become the de facto standard for overall control of IT
Organisations will consider and use a variety of IT models, standards and best
practices. These must be understood in order to consider how they can be used
together, with COBIT acting as the consolidator (‘umbrella’).
COSO
COBIT
ISO 9000
ISO 17799/27000
SCOPE OF COVERAGE
CONFORMANCE
Drivers PERFORMANCE: Basel II, Sarbanes-
Business Goals Oxley Act, etc.
IT Governance
COBIT
Governance
Management
Evolution
Control
Audit
COBIT:
► Has internationally accepted good practices
► Is management-oriented
► Is supported by tools and training
► Is freely downloadable LIES!!!
► Allows the knowledge of expert volunteers to be shared and leveraged
► Continually evolves
► Is maintained by a reputable not-for-profit organisation
► Maps 100 percent to COSO
► Maps strongly to all major, related standards
► Is a reference, not an ‘off-the-shelf’ cure
Enterprises still need to analyse control requirements and customise COBIT based on their:
► Value drivers
► Risk profile
► IT infrastructure, organisation and project portfolio
An organisation depends on reliable and timely data and information. COBIT components provide a
comprehensive framework for delivering value while managing risk and control over data and
information.
IT Resources
Business Strategy
IT Processes
Information
Criteria
Provides Defines a
sharper common
business language
focus
Has general
acceptability
amongst
organisations
Business Focus
► COBIT achieves sharper business
focus by aligning IT with business Provides
Defines a
objectives. sharper
common
business
► The measurement of IT performance language
focus
should focus on IT’s contribution to
enabling and extending the business
strategy.
► COBIT, supported by appropriate Ensures Helps meet
business-focused metrics, can ensure process Control regulatory
orientation Framework requirements
that the primary focus is value
delivery and not technical excellence
as an end in itself.
Has general
acceptability
amongst
organisations
Process Orientation
► When organisations implement
COBIT, their focus is more process- Provides
Defines a
oriented. sharper
common
business
language
► Incidents and problems no longer focus
divert attention from processes.
► Exceptions can be clearly defined as
part of standard processes.
Ensures Helps meet
► With process ownership defined, process Control regulatory
assigned and accepted, the orientation Framework requirements
organisation is better able to
maintain control through periods of
rapid change or organisational crisis.
Has general
acceptability
amongst
organisations
General Acceptability
► COBIT is a proven and globally
accepted standard for increasing the Provides
Defines a
contribution of IT to organisational sharper
common
business
success. focus language
► The framework continues to
improve and develop to keep pace
with good practices.
► IT professionals from all over the Ensures Helps meet
world contribute their ideas and time process Control regulatory
orientation Framework requirements
to regular review meetings.
Has general
acceptability
amongst
organisations
Regulatory Requirements
► Recent corporate scandals have
increased regulatory pressures on Provides
Defines a
boards of directors to report their sharper
common
business
status and ensure that internal language
focus
controls are appropriate. This
pressure covers IT controls as well.
► Organisations constantly need to
improve IT performance and Ensures Helps meet
demonstrate adequate controls over process Control regulatory
their IT activities. orientation Framework requirements
► Many IT managers, advisors and
auditors are turning to COBIT as the
de facto response to regulatory IT Has general
requirements. acceptability
amongst
organisations Security Baseline
comes in here
Common Language
► A framework helps get everybody on
the same page by defining critical Provides
Defines a
terms and providing a glossary. sharper
common
business
language
► Co-ordination within and across focus
project teams and organisations can
play a key role in the success of any
project.
► Common language helps build Ensures Helps meet
confidence and trust. process Control regulatory
orientation Framework requirements
Has general
acceptability
amongst
organisations
► The COBIT framework is based on the premise that IT needs to deliver the information that an
enterprise requires to achieve its objectives.
for Business
achieving Objectives
i to
Business
Processes
Information
provide
IT Resources
and Processes
► The COBIT framework helps align IT with the business by focusing on business information
requirements and organising IT resources. COBIT provides the framework and guidance to
implement IT governance.
The principle of the COBIT framework is to link management’s IT expectations with management’s
IT responsibilities. The objective is to facilitate IT governance to deliver IT value whilst managing IT
risks.
IT Resources
Business Strategy
IT Processes
Information
Criteria
As a control and governance framework for IT, COBIT focuses on two key areas:
► Providing the information required to support business objectives and requirements
► Treating information as the result of the combined application of IT-related resources that
need to be managed by IT processes
Information Criteria
Effectiveness
IT Process Efficiency
Confidentiality
Integrity
Availability
Business Requirement Compliance
Reliability
Control Approach
IT Resources
IT Processes Applications
Domains
Consideration Information
Processes
• ……………………………
• …………………………… Activities Infrastructure
• ……………………..…….. People
The COBIT framework describes how IT processes deliver the information that the business needs to
achieve its objectives.
For controlling this delivery, COBIT provides three key components, each forming a dimension of the
COBIT cube.
IT Resources
IT Processes
► COBIT describes the IT life cycle with the help of four domains:
§ Plan and Organise
§ Acquire and Implement
§ Deliver and Support
§ Monitor and Evaluate
► Processes are series of activities with natural control breaks. There are 34 processes across the
four domains. These processes specify what the business needs to achieve its objectives. The
delivery of information is controlled through 34 IT processes.
► Activities are actions that are required to achieve measurable results. Moreover, activities have
life cycles and include many discrete tasks.
Information Criteria
Domains IT Resources
Processes
Activities
IT Processes
IT and Business
Let’s look at the COBIT process model, which consists of 34 IT processes defined within the four IT
domains.
?
New Projects Organisation
IT Performance
► To satisfy business objectives, information needs to conform to specific control criteria, which
COBIT refers to as business requirements for information.
► Broadly, information criteria are based on the following requirements:
§ Quality
§ Fiduciary (trust)
§ Security
Quality Requirements
Fiduciary Requirements
Security Requirements
Information Criteria
IT Resources
IT Processes
Deals with complying with those laws, regulations and contractual arrangements to which the
Compliance business process is subject, i.e., externally imposed business criteria as well as internal policies
Relates to the provision of appropriate information for management to operate the entity and to
Reliability
exercise its fiduciary and governance responsibilities
► IT processes manage IT resources to generate, deliver and store the information that the
organisation needs to achieve its objectives.
► The IT resources identified in COBIT are defined as:
§ Applications are automated user systems and manual procedures that process information.
§ Information is data that are input, processed and output by information systems, in
whatever form used by the business.
§ Infrastructure includes the technology and facilities, such as hardware, operating systems
and networking, that enable the processing of applications.
§ People are the personnel required to plan, organise, acquire, implement, deliver, support,
monitor and evaluate information systems and services. They may be internal, outsourced
or contracted, as required.
Information Criteria
Applications
Information
Infrastructure
People
IT Processes
IT Resources
C O B I T
ME1 Monitor and evaluate IT FRAMEWORK
PO1 Define a strategic IT plan.
performance. INFORMATION
PO2 Define the information
ME2 Monitor and evaluate
architecture.
internal control.
Efficiency Integrity PO3 Determine technological
ME3 Ensure compliance with
Effectiveness Availability direction.
external requirements.
Compliance PO4 Define the IT processes,
ME4 Provide IT governance. Confidentiality
organisation and
Reliability relationships.
MONITOR PLAN PO5 Manage the IT investment.
AND AND PO6 Communicate management
EVALUATE ORGANISE
aims and direction.
IT PO7 Manage IT human resources.
DS1 Define and manage service RESOURCES PO8 Manage quality.
levels. PO9 Assess and manage IT risks.
DS2 Manage third-party services. PO10 Manage projects.
DS3 Manage performance and
capacity.
DS4 Ensure continuous service. Applications
Information
DS5 Ensure systems security. AI1 Identify automated solutions.
Infrastructure
DS6 Identify and allocate costs. People AI2 Acquire and maintain
DS7 Educate and train users. DELIVER application software.
ACQUIRE
DS8 Manage service desk and AND AI3 Acquire and maintain
AND
incidents. SUPPORT IMPLEMENT technology infrastructure.
DS9 Manage the configuration. AI4 Enable operation and use.
DS10 Manage problems. AI5 Procure IT resources.
DS11 Manage data. AI6 Manage changes.
DS12 Manage the physical AI7 Install and accredit solutions
environment. and changes.
DS13 Manage operations.