Information Security Challenges
Information Security Challenges
INFORMATION
SECURITY CHALLENGES
IN SHARED SERVICES MODEL
BEST PRACTICES THAT WORK
Abstract
As the title suggests, this white paper focuses on some of the unique
IT Security challenges experienced in a Shared Services Model and the
best practices to successfully handle and/or reduce exposure
to these.
Availability of information and the ability to use it in innovative ways
is the success mantra of every organization but this also requires
protection of valuable information from malicious intent, inadvertent
incidents and natural disasters at all times.
The nature and framework of shared services organizations,
characterized by shared infrastructure, service-oriented organizational
units, service groups working in silos, overlapping responsibilities, etc
pose multiple challenges to the adoption and roll-out of an effective
Information Security Plan. But by having the right focus on IT security
governance, creating lean processes, implementing appropriate RACI
and SoD matrices, providing adequate and timely training, etc the
impact of these challenges can be significantly reduced.
Background
Shared Services Model1 is being increasingly adopted by medium to large organizations with the goal of improving the financial performance
of the corporation. It is achieved by eliminating redundancies, optimizing use of the limited resources, economies of scale and using common/
reusable tools and artifacts.
While the financial upside is encouraging, the pitfalls of IT Security, when not managed appropriately, turn out to be significant deterrents in
adopting a Shared Services Model.
This paper is organized into two distinct sections:
Section I Presents the challenges faced with the intent of increasing awareness
Section II Discusses Best Practices that can help handle/reduce the severity of such challenges
1
Shared Services Model – An internal organization becomes the centralized service provider for all Business organizations in the company, promoting reuse and
sharing. The Business organizations choose and request products and services as necessary from this shared service provider.
Sl # Challenge Description
1 IT Security is assigned a low priority The organization and senior management have not instilled the right focus on
implementing IT security practices.
2 Ad hoc Security Governance Absence of an Information Security Management System (ISMS) or a structured
governance mechanism.
3 Ambiguity in roles and responsibilities Ambiguities exist on the roles and responsibilities of the different players (Business,
teams in SSO, etc.) in an SSO.
4 Inadequate Separation of Duties Overlapping and shared responsibilities in an SSO makes it difficult to implement
appropriate level of separation in duties.
5 Varied Interpretations of Security In the absence of standard interpretations, the different individuals and teams have
Requirements their own interpretations.
6 Tendency to reduce Risk level The teams show a tendency to reduce the ‘Risk Level’ to bypass the rigors of the
governing processes.
7 Multiple vendors Relentless competition and sense of insecurity have led to reluctance in sharing
responsibility and little or no collaboration among the vendors.
8 Business/Operations spread across The organization is based out of and functions from multiple locations spread all
multiple geographies across the globe.
2 Ad hoc Security Governance Information Security • Security strategies became an integral part of enterprise
Governance – Setup the governance
ISO Network
3 Ambiguity in roles and Created a RACI chart to • Removed ambiguities in roles and responsibilities
responsibilities cover all security control
requirements
4 Inadequate Separation of Duties Created multiple • Made it easier to adopt and comply to the SoD principles
variations of SoD matrix,
• Provided other equally efficient means to manage checks and
while accounting for
compensating controls and balances
technological limitations • Provided means to counter technological limitations
5 Varied Interpretations of Process Re-definition to • All the security requirements were built into the processes
Security Requirements create ‘lean’ and ‘fit for and were not left open for individual interpretations
purpose’ processes
6 Tendency to reduce Risk level Tailoring of ISO 27001 / • Provided the option to bypass controls which did not make
27002 Requirements business sense – cost wise
• Allowed the organization to drop requirements which were
not applicable/meaningful to their operational setup
7 Multiple vendors Creating and implementing • Removed ambiguities in roles and responsibilities – Reduced
appropriate RACI chart avenues to blame ‘others’
8 Business/Operations spread Established a structured • Increased awareness and focus on local information
across multiple geographies training enablement protection policies, procedures and practices
process
9 Lack of Training/ Awareness Established a structured • Increased awareness on organizational mandates and
training enablement requirements
process
• Better enablement for process compliance
• Reduction in repetition of mistakes/violations
© 2018 Infosys Limited, Bengaluru, India. All Rights Reserved. Infosys believes the information in this document is accurate as of its publication date; such information is subject to change without notice. Infosys
acknowledges the proprietary rights of other companies to the trademarks, product names and such other intellectual property rights mentioned in this document. Except as expressly permitted, neither this
documentation nor any part of it may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, printing, photocopying, recording or otherwise, without the
prior permission of Infosys Limited and/ or any named intellectual property rights holders under this document.