Information Security Assurance - An Overview For Implementing An Information Security Assurance Programme - Full Report
Information Security Assurance - An Overview For Implementing An Information Security Assurance Programme - Full Report
assurance
An overview for implementing an information
security assurance programme
July 2010
Published by
Information Security Forum Limited
Project team
Martin Tully
Jason Creasey
Design
Louise Liu
Key to symbols
Member quote
Note
Warning
Key
Warning
This document is confidential and purely for the attention of and use by organisations that are Members of the Information Security Forum
(ISF). If you are not a Member of the ISF or have received this document in error, please destroy it or contact the ISF on isfinfo@securityforum.
org.
Any storage or use of this document by organisations which are not Members of the ISF is not permitted and strictly prohibited.
This document has been produced with care and to the best of our ability. However, both the Information Security Forum and the Information
Security Forum Limited accept no responsibility for any problems or incidents arising from its use.
Acknowledgements 30
TE
and consistently.
PR
CH
PE
OC
NO
OP
CO
ES
LO
RIS
LE
MP
GY
GO
LIA
VE
E
NG
RE
NC
RN
SE
HA
AR
E
XC
AN
CH
EE
&R
CE
DG
EP
LE
OR
OW
TS
KN
A pdf copy of the ISF Security Model can be downloaded from the ISF’s Member Exchange System (MX), which can
be used to clearly describe to your team and others (management, potential Supply Chain or other Membership
prospects) the key aspects of the information security environment within your organisation.
Using a rating from very low to very high, the way in which this report aligns with the ISF Security Model is shown in the table
below.
This report
This report provides an overview of information security assurance and includes high-level actions to consider when implementing
Part one
an information security assurance programme enterprise-wide. As a central part of this programme, a repeatable security
assurance process is outlined that can be applied to individual environments within an organisation. This process will help an
organisation: identify security requirements; implement a control framework; monitor and evaluate associated controls; and
initiate improvements.
This report is based on the findings from a total of 16 ISF Member workshops held worldwide, as part of the Security Assurance:
ISO 27000 and beyond project, which discussed key issues associated with security assurance and explored how the Information
Security Management System (ISMS) in ISO/IEC 27001 could be used – but typically not in isolation – to help provide information
security assurance. Consequently, this report primarily looks at security assurance from the perspective of (and performed by)
an information security function.
ISO/IEC 27001
“This International Standard specifies the requirements for establishing, implementing, operating, monitoring, reviewing,
maintaining and improving a documented ISMS within the context of the organisation’s overall business operations and
related risks. It specifies requirements for the implementation of security controls customised to the needs of individual
organisations.
The ISMS is designed to protect information assets by a risk management approach and to give confidence to interested
parties.”
ISO/IEC 27001 – Information technology; Security techniques;
Information security management systems
There was no overall consensus at the workshops on the definition or coverage of security assurance. In particular
external auditors or assessors may take a different view. Furthermore, some attendees referred to information
security assurance as enterprise-wide security management.
Purpose
Workshop attendees agreed that one of the main objectives for an information security function is to provide assurance
to senior management internally that information risks are being managed enterprise-wide. The purpose of this report is to
help Members understand the concepts associated with information security
assurance, upon which Members can build an enterprise-wide information Further reading
security assurance programme. Security Audit of Business Applications
Reporting information risk
To avoid repetition the term ‘information security assurance’ is Information Risk Management
often abbreviated to ‘security assurance’ throughout this report. in Corporate Governance
INFORMA
Reporting information
TION
SECURITY
risk
FORUM
g organisati
ons
urity solutions
audit of
January 2010 considera
Security applications
ble
. Members
which
can
nts, while
Informa
tion Risk
ent in
Manage
men
Corporate
Corporate t in
Governanc
WORKSHOP Governanc
REPOR e T
e: Workshop
Report
December
2003
Audience
• information security managers, directly responsible for the implementation of the information security assurance programme
• information security professionals who select or apply information security controls as part of an information security assurance
process for an individual environment
• internal auditors, risk managers and managers of other business departments who may get involved in a security assurance
programme.
This report is based on work carried out as part of an ISF workshop project which included:
All meeting minutes and Member presentations delivered are available on the ISF’s Member Exchange System (MX).
The Security Assurance: ISO 27000 and beyond workshops were run in association with the Security Audit of Business
Applications workshops to help distinguish between the key activities of these similar but distinctly different projects.
In total approximately 290 attendees attended the workshops and the majority of attendees were information security
professionals, along with significant attendance by representatives of security audit and security assurance departments.
Project deliverables
The main deliverable from this Security Assurance: ISO 27000 and beyond project was the workshops themselves. This brief
Part one
summary report is one of four additional deliverables associated with the project. The other three deliverables are:
• A spreadsheet Mapping ISF tools to the ISO/IEC 27001 Information Security Management System
(ISMS) – designed to assist Members in understanding which ISF tools can be used to support the 0DSSLQJ,6)WRROVWRWKH,62,(&
,QIRUPDWLRQ6HFXULW\0DQDJHPHQW6\VWHP,606
6HFXULW\ Assurance:
implementation of the Information Security Management System (ISMS), which is part of the ISO/ ISO 27000 and beyond project
British Standards are reproduced with the permission of the British Standards Institution (BSI) under licence number 2010JK0005. Copyright subsists in all BSI publications. British Standards can be obtained in PDF or hard copy formats from
the BSI online shop: www bsigroup com/Shop or by contacting BSI Customer Services for hardcopies only: Tel: +44 (0)20 8996 9001 Email: cservices@bsigroup com
Security assurance is concerned with the effective implementation of information security management enterprise-wide. This part
of the report positions information security assurance in relation to corporate governance and information security governance.
It then provides a more detailed definition of information security assurance and puts it in context with other types of assurance.
Before defining information security assurance, ISF Members agreed that it was important to understand the topics that directly
influence information security assurance.
From a business perspective, corporate governance (eg legislation such as the Turnbull, King and Dey reports) and information
security governance (eg guidance such as the emerging ISO/IEC 27014 – Governance of Information Security and IT Governance
Part two
Institute’s IT Governance Framework) both have a significant influence on information security assurance. Therefore information
security assurance can be positioned as shown in Figure 1 below.
Positioning assurance
Corporate governance
Corporate governance and information security governance typically provide direction and set strategy for information security
within an organisation. Activities associated with this strategy are then implemented as part of an information security assurance
programme. More information is provided about the governance topics and how they relate to information security assurance
on the following pages.
The ISF’s workshop report: Information Risk Management in Corporate Governance defined corporate governance at a very high-
level to be concerned with how the organisation is directed and managed within its operating environment. According to the
report, corporate governance can be considered in more detail across six key areas.
No Area Content
1 Board conformance The structure and composition of the Board (and its
committees).
2 Board performance and The effectiveness with which the Board discharges its
Board
effectiveness duties.
Perspective
3 Strategy, planning and The way in which the Board ensures financial
monitoring accountability, management structure and plans for the
Part two
future.
4 Risk management and The way in which the Board ensures strong internal
compliance controls with robust risk management and compliance
processes.
Organisation 5 Transparency and disclosure Transparent reporting and disclosures of financial and
Perspective non-financial information.
6 Stakeholders and the triple Good corporate citizenship including social, ethical
bottom line and environmental conduct, the relationship and
communication with external stakeholders.
It can be seen from Figure 2 that the six key areas of corporate governance can be split into two sets of three. In the table,
numbers one to three deal with the operation of the Board, its set up and its duties, while numbers four to six are more directed
towards what the organisation needs to do, to support the Board in good corporate governance.
An overview of global corporate governance codes is provided in the Directory of information security principles,
standards and corporate governance, which is available for download from the Security Assurance: ISO 27000 and
beyond project area on MX.
Information security governance is an emerging topic and an agreed definition is still being formulated across the information
security community. Industry definitions suggest that information security governance includes aligning information security with
business objectives, requiring compliance with laws, regulations and information security policy.
A subset of corporate / enterprise governance that provides strategic direction, ensures that objectives are achieved,
manages risks appropriately, uses organisational resources responsibly, and monitors the success or failure of the enterprise
security programme.
Existing guidance produced by both The National Institute of Standards and Technology (NIST) and The IT Governance Institute
(ITGI), outline five main information security governance components, which are:
NIST and ITGI advocate that these components should be the focus for information security professionals when reporting back
to senior management on the status of information security.
“An effective information security assurance programme needs to help achieve the strategic objectives of an
Part two
The working draft ISO/IEC 27014 – Governance of Information Security framework illustrates at a high-level the relationship
between the more detailed tasks performed as part of information security assurance and the high-level direction from information
security governance. An excerpt of this early draft framework is shown in Figure 3.
Security governance
Security assurance
Figure 3: Relationship between information security assurance and information security governance
The model above shows one way in which security assurance can relate to security governance. However, in most cases security
assurance does not just equate to an ISMS. In reality, a security assurance programme will cover more than one security assurance
process (similar to the Plan-Do-Check-Act (PDCA) process within an ISMS) enterprise-wide. Furthermore, attendees highlighted
that other specialised security-related activities are carried out (eg metrics, testing and assessment) to cover enterprise-wide or
local activities, particularly where no specific security assurance process had been applied.
The ISF have been heavily involved in the development of an early draft of ISO/IEC 27014 from the outset as part
of the ISO Liaison activities and there will also be an ISF briefing paper delivered on information security governance.
Establishing links between information security assurance and information security governance, as outlined in Figure 3, can be
challenging to demonstrate in practice.
ISF Members who attended the Security Assurance: ISO 27000 and beyond project workshops suggested that this challenge
can be overcome by:
• implementing a coherent, integrated structure that includes key activities relating to corporate governance, information
security governance and information security assurance
• appointing owners of individual security assurance processes for particular environments, who will then act as a steering
Part two
committee supporting decision-making
• identifying improvements to the overall security assurance programme to increase the visibility of information security
assurance and better align it with governance objectives.
The Plan-Do-Check-Act (PDCA) problem solving process in ISO/IEC 27001 was identified as one of many methods of
structuring the activities associated with an individual information security assurance process, as part of a wider security assurance
programme. More details of this approach are provided below – and other approaches are discussed later in the report.
The Plan-Do-Check-Act (PDCA) cycle is a four-step model for carrying out change, which emphasises continuous
improvement as part of a management system standard.
Plan – establish objectives and make plans (analyse your organisation’s situation, establish your overall objectives and set your
interim targets, and develop plans to achieve them).
Do – implement your plans (do what you planned to).
Check – measure your results (measure / monitor how far your actual achievements meet your planned objectives).
Act – correct and improve your plans and how you put them into practice (correct and learn from your mistakes to improve
your plans in order to achieve better results next time).
Security assurance is a relatively new term, with little common understanding by ISF Members who attended the Security
Assurance: ISO 27000 and beyond project workshops.
There was considerable confusion about security assurance and the title of the project. Rather than considering the title of the
project as a whole (which was the intention of the project), different ISF Members focused on the individual terms in the title, as
shown by the coloured text in Figure 4 below.
Information security
Assurance:
Part two
Some attendees, particularly those with experience of external audit, initially focused on more general aspects of assurance (red
text) without emphasising the importance of information security (blue text).
A number of attendees considered ISO/IEC 27001 (green text) in isolation as the only method of conducting information
security assurance in their organisation, whilst others used different security assurance tools to help run the security assurance
programme (eg ISF’s The Standard of Good Practice for Information Security, COBIT and ISACA’s IT Assurance Framework). It was
generally agreed that the project should cover all three aspects in combination.
In general, workshop attendees agreed that the meaning of assurance is often about providing evidence to ‘someone’ that
‘something’ is working as required. In its simplest form, assurance is often referred to as ‘a high level of confidence that activities
are working as they should’. Related types of assurance from other disciplines include information assurance, quality assurance
and risk assurance.
Information security assurance is not usually a regulatory obligation and therefore does not require external
verification. ISF Members identified the following areas to be out of scope for this project: assurance of financial
records; annual reporting; attestation; and external audit. External audit may be involved with verifying activities
specific to corporate governance or information security governance, furthermore they may perform independent
reviews as part of ISO/IEC 27001 certification.
The majority of attendees agreed that the purpose of security assurance is more closely related to information security governance
or corporate governance than other types of assurance.
ISF Members agreed that information security assurance relates specifically to ensuring that practical implementation
activities (eg performing information risk analysis and implementing a control framework) are implemented
effectively, which are driven by the more strategic elements of information security governance (eg determining the
risk appetite).
After careful consideration of the collective set of activities specifically associated with security assurance, a major outcome from
the project workshops was that most attendees (but not all) agreed on the following definition for security assurance:
In some organisations, security assurance may simply be responding to the Chief Executive of the Organisation (CEO) by
providing evidence that the organisation is sufficiently ‘secure’. For other organisations, particularly where the information security
function is outsourced, other stakeholders may require evidence of information security assurance.
Part two
Some ISF Members refer to information security assurance within their organisations as enterprise-wide security
management.
A major finding was that a number of different approaches to security assurance were adopted by Members. Indeed, a number
of attendees had no official security assurance programme in place.
A small proportion of ISF Members had their own specialised information security assurance department; however
the duties of their department often varied greatly and tended to be compliance focused.
Attendees believed that there were a number of similarities and differences between information security assurance and
information security audit (examined during a concurrent ISF project entitled: Security Audit of Business Applications).
Information security assurance and information security audit can cover some similar activities, such as: performing an assessment
of security; monitoring the state of security; and establishing clear actions (audits typically result in recommendations) to help
mitigate the risks associated with a business application, system or network.
During a security assurance process, multiple sources of validation are typically considered and amalgamated to formulate an
overall opinion, both on a subjective and qualitative basis (eg information security audit results, incidents, security awareness,
system monitoring logs, threat and vulnerability management and fraud testing). This information is captured, tracked and
reported upon to provide a level of ‘assurance’ to senior management that security is working effectively.
Much of the liaison with external stakeholders, such as auditors (particularly external auditors), is likely to be
performed as part of an overall security governance framework. However, in many organisations, there are a
number of more detailed elements of a security assurance programme (eg a security assurance process, such as an
ISMS, relating to a particularly important business application) that are likely to be of interest to both external and
internal auditors – and Members believed that this trend is likely to increase.
In contrast, an information security audit typically provides an independent opinion on the status of information security for a
target environment (eg computer system, network or business application) for a particular part of the organisation at a given
point in time.
In an attempt to provide a high-level comparison between information security assurance and security audit, a table has been
produced showing how they differ in terms of ‘coverage’ and ‘time’.
The comparison in Figure 5 is only a high-level example and there would often be other considerations including
standards, independence, stakeholders and reporting. Furthermore, a security audit can cover all security
arrangements enterprise-wide over a period of time (eg using a SAS 70 Type II review).
Consult with both internal and external auditors when developing a security assurance programme to ensure that
their requirements are likely to be met – and to help gain their support during any potential audit of processes (or
other specialised security-related activities) associated with a security assurance programme.
A security assurance programme brings together a set of related security assurance processes and specialised activities to provide
assurance to senior management internally that risks are being managed enterprise-wide.
ISF Members who attended the project workshops suggested that there are a range of possible drivers for an information
security function to establish an effective security assurance programme enterprise-wide. These drivers are outlined in the table
below, together with examples of the way in which they can help improve organisational approaches to information security.
Part three
• providing continual – and appropriate – status updates to senior management
Establishment of an effective framework for • creating a flexible framework for information security that is proactive rather than reactive
information security controls • adapting to changes in the organisation’s risk profile
• including a consistent set of security controls that are based on information security-related standards
• conducting ad hoc self assessments to discover the status of security controls
• monitoring the effectiveness of security controls in a systematic manner and on a regular basis
Implementation of a consistent and appropriate • establishing a single point of contact for the entire information security programme enterprise-wide
set of security controls, enterprise-wide • building a sustainable, repeatable security management process that can be applied to help treat
information risk enterprise-wide
• achieving consistent compliance with legal and regulatory requirements
• understanding how the organisational culture influences information security
An approved method of addressing the gaps • providing specialised information security services (eg metrics, testing and assessment) in a targeted
and overlaps in security assurance processes manner
• reducing the amount of (often duplicated) effort spent on conducting specialised activities in isolation
• focusing on specialised activities that are part of ‘enterprise-wide security management’ or ‘business as
usual’
At the core of a security assurance programme are one or more security assurance processes (which can be based around the
Plan-Do-Check-Act (PDCA) elements of an ISMS). By following these processes carefully for a particular environment (eg a
customer service department of online banking system), an organisation should be able to identify security requirements, select
an appropriate control framework(s), and validate that it is operating effectively.
Workshop attendees believed that these processes need to be supported by a range of specialised activities (eg security policy,
metrics and testing) to ensure that a consistent approach is taken and that all parts of the enterprise are covered by the security
assurance programme.
Finally, it is important that the overall security assurance programme is well managed. A clear line of communication should be
established with all relevant stakeholders and aligned with the organisation’s corporate and security governance approach. The
way in which these components fit together is shown in Figure 6 below.
Security
assurance Security
programme Security architecture Security
policy strategy
Security Identify
Security assuranceImplement
process 3 Monitor and
Initiate
awareness security control evaluate
improvementsents
requirements framework controls Security
IdentifySecurity assurance
Implement
process 2 Monitor and
Part three
Security
Security assessment
testing
Security
Security
compliance
access control Security
metrics
Assigning clear responsibility and accountability to individuals is often a key part of the success of a security assurance programme.
It may also be beneficial to look at the individual user’s perspective on information security and how information is protected in
end user environments.
When assessing an end user environment, the ISF report on Protecting Information in the End User Environment can
be used. This report is available on the ISF’s Member Exchange System (MX).
A security assurance process is a way of ensuring that an appropriate set of controls are applied to a particular environment within
an organisation. The main phases of a typical security assurance process are outlined in Figure 7 below. This figure also shows
that there may be a number of other security assurance processes that are typically applied to other parts of an organisation.
Identify
Security assuranceImplement
process 3 Monitor and
Initiate
security control evaluate
improvementseents
requirements framework controls
IdentifySecurity assurance
Implement
process 2 Monitor and
Initiate
security control evaluate
improvements ntts
requirements framework controls
IdentifySecurity assurance process 1
Implement Monitor and
Initiate
security control evaluate
improvements
requirements
Identify framework
Implement Monitorcontrols
and
Initiate
security control evaluate
improvements
requirements framework controls
Using a security assurance process, appropriate information security controls can be selected, implemented and monitored
effectively. The results of a security assurance process should then be reported to senior management as evidence that information
Part three
risks are being managed in that particular environment.
ISF Members who attended the project workshops believed that security assurance is about making sure the
process is adhered to, rather than performing detailed activities, such as applying controls. Therefore security
assurance is about managing the process, providing advice and guidance and performing reviews.
Whilst it is possible to apply one security assurance process enterprise-wide (eg using the PDCA aproach in the ISMS element
of ISO/IEC 27001), the vast majority of attendees had not done this. Typically a security assurance process was only used in
particular parts of their organisation, because it:
• was used to certify a particular topic or area (eg a payment system or a data centre) – for example, to achieve ISO/IEC 27001
certification
• applied to a particular region or country (one global Member had a very impressive implementation of ISO/IEC 27001 which
applied only to their Italian region)
• covered only specific business units, which can often be separate legal entities within an ISF Member
• had not yet been rolled out enterprise-wide (and may not ever be applied to some specialised parts of an organisation that
have unique regulatory or operational requirements).
Consequently, the vast majority of attendees agreed that it was necessary to establish a more comprehensive security assurance
programme enterprise-wide.
Attendees at the project workshops believed that an information security assurance programme applies
enterprise-wide, whereas an information security process (eg an ISMS based on ISO/IEC 27001) typically focuses
on one part of the organisation (eg a customer services department or online banking system). Many organisations
apply the ISO/IEC 27001 process on protecting the organisation’s most critical data. Furthermore, they may deploy
an ISMS in one particular department as a pilot prior to expanding it across the organisation.
Specialised activities
Security assurance processes typically cover particular environments and are seldom applied to the entire organisation.
Consequently, there may be many areas of the organisation not covered, so a range of security-related specialised activities
(eg security policy, metrics and testing) are required to complement these processes. These specialised activities, often performed
at a corporate level, will help ensure that:
• all topics associated with information security are covered across the organisation
• information security is addressed in a consistent manner
• gaps and overlaps are identified and managed effectively enterprise-wide.
Many specialised activities, such as the information security policy, will be applied to all parts of the organisation and not just to
the particular environment covered by the security assurance process.
Part three
A security assurance process is a way of ensuring that an appropriate set of controls are applied to a particular environment
within an organisation (eg a customer services department or online banking system) – or sometimes to the whole organisation.
• outlines the different approaches that can be used to implement an information security assurance process
• introduces a list of challenges (and associated difficulties) when implementing a security assurance programme
• presents the four main phases of a security assurance process and a number of actions to consider when creating an effective
and repeatable security assurance process
• highlights different sources of material to support an information security assurance process.
There are many different approaches for implementing an information security assurance process. ISF Members identified four
main approaches they used – often in combination – which were to:
• use the ISMS in ISO/IEC 27001 as a framework when designing the security assurance process
• implement controls from other information security-related standards (eg SoGP, COBIT, PCI/DSS and ITIL)
• deploy the ISF’s Standards and Benchmarking tools (eg the Healthcheck and Benchmark), supported by the Information Risk
Analysis Methodology (IRAM)
• develop a tailored approach to achieve specific organisational objectives.
“Our organisation uses the ISF Standard of Good Practice: it is measured by using the Benchmark, monitored by
our internal audit and communicated to key business employees.”
ISF Members agreed that an ISMS is the most popular approach for implementing an information security assurance process.
However some organisations have developed their own information security assurance approach, which may include elements
from all four of the approaches listed above.
Certification to ISO 27001, with independent verification from an external auditor, is seen by ISF Members as a
Part four
possible approach (but often time consuming and expensive) to demonstrate that an effective security assurance
process has been applied.
ISF Members highlighted a number of challenges facing organisations when setting up a security assurance process. An overview
of these challenges is provided in the table below.
Feedback from third parties, including experts in security assurance and audit, resulted in a number of other challenges being
identified, which included:
Members at the project workshops suggested a number of actions to consider to support a security assurance process – and to
help address the challenges identified. These actions to consider – and how they relate to the four phases of a security assurance
process – are described in more detail in this part of the report.
The actions to consider are based on hints and tips provided by attendees at the workshops, and are not intended
to provide a ‘how to’ guide. Members will need to use these actions as a basis for implementing their own
comprehensive security assurance process. More detailed actions are likely to be required to make sure all key
activities are being performed, that the process has been implemented properly, and that reviews are in place.
An overview of each phase is provided in the table below, together with high-level actions to consider. The four phases are
broadly aligned to the Plan-Do-Check-Act elements of an ISMS, but can go beyond ISMS requirements – and should apply to
any approach taken.
Workshop attendees agreed that it is important to assign individuals involved in administering the security assurance
process with:
• clear roles and responsibilities
• knowledge, skills and experience to administer security assurance correctly
• awareness of the security assurance process and overall security assurance programme, linked to business
objectives.
Much of the time spent at the workshops was devoted to demonstrating how ISF tools can be used to support each phase of
the security assurance process and, in particular, to provide a mapping to an ISMS.
This activity culminated in a spreadsheet-based tool being produced to map ISF tools to the ISMS in ISO/IEC 27001. More details
of this mapping are outlined below.
Mapping ISF tools to the ISO/IEC 27001Information Security Management System (ISMS)
The ISF have produced a spreadsheet-based tool that maps ISF tools to the ISMS. This mapping tool will assist Members
to understand which ISF tools can be used to support the implementation of the Information Security Management System
(ISMS), which is the main part of the ISO/IEC 27001 framework.
The tool contains two worksheets to outline the mapping between the ISMS and ISF tools:
• Mapping – complete: detailed mapping of the ISF Standards and Benchmarking and Information Risk Analysis Methodology
(IRAM) tools mapped to the ISMS.
• Mapping – list view: shows only the high-level parts of the ISMS mapped to specific ISF tools.
The mapping between the ISMS and ISF tools include ratings to indicate the degree to which the ISF tool can be used to
support the implementation of the corresponding ISMS activity.
The spreadsheet showing the Mapping ISF tools to the ISO/IEC 27001Information Security Management System
(ISMS) contains the actual full text from the ISMS in ISO/IEC 27001, which corresponds exactly to the references
outlined in this part of the report. The spreadsheet is available for download from the Security Assurance: ISO 27000
and beyond project area on MX.
Mappings to the appropriate references in the ISO/IEC 27001 ISMS are also provided for each of the four phases of for an
information security assurance process (for example ISO/IEC 27001 reference 4.2.1f relates to ‘Identify and evaluate options for
Part four
the treatment of risks’). The actions to consider may relate to the same reference point in an ISMS. Conversely a number of ISMS
references may be covered by one particular action to consider.
What is it?
The first phase establishes the scope and policies required for the security assurance process to be performed in a structured
manner. It sets the foundation for risk-based information security controls to be deployed to meet the objectives of information
security and the business.
Sets the objectives for security assurance and defines the approach for selecting controls that are: aligned to business strategy;
based on a structured risk assessment methodology; and comply with legal and regulatory obligations.
How do I do it?
Risk treatment
Risk treatment tables (a technique for capturing the responses chosen by the business to a particular information risk type)
should be used to record responses and monitor the progress of actions taken to address a particular risk. The example
below is described in the ISF’s Reporting information risk report and shows a populated risk treatment table.
The information risk treatment table above is an example, but it can be edited and modified by Members.
Having identified security requirements, this phase focuses on identifying sources of controls, selecting appropriate controls
and implementing them effectively. This phase also provides an outline of the way in which roles and responsibilities should be
assigned for activities that contribute towards a successful information security process.
Mitigates the risks identified during the identifying security requirements phase by implementing information security controls as
part of the security assurance framework.
How do I do it?
This directory provides Members with a source of reference to assist in the identification of information security-related
standards, applicable corporate governance codes and common bodies of knowledge for information security. Publications
outlined in the directory provide a source of controls in information security-related standards; an overview of compliance
requirements in governance codes; and sources of information about certification and accreditation.
Principles Security Standards Matrix Corporate Governance Matrix
Part four
This directory is available for download from the Security Assurance: ISO 27000 and beyond project area on MX and can be
used as an initial source of data by Members to help them:
• investigate whether internal standards, policies and procedures should be changed to accommodate new or upcoming
changes to industry standards and legislation
• design an effective compliance programme by understanding the latest developments in standards, laws and regulations
• establish an integrated strategy and architecture for information security that reflects global developments in information
security
• align education and training for information security professionals with recognised industry certification.
In addition to information security controls found in information security-related standards, ISF Members often use
a more detailed set of controls when implementing a comprehensive control framework to meet requirements and
mitigate risks.
controls
• making individuals aware of their responsibilities and accountable for their actions.
When assessing the individual responsibilities within an environment, the ISF report on Protecting Information in
the End User Environment can be used. This report is available on the ISF’s Member Exchange System (MX).
2.3e Provide information security training and awareness to highlight the importance of information security controls 4.2.2e
The ISF report on The Evolution of Security Awareness can be used to help determine what should go into an
information security awareness programme. This report is available on the ISF’s Member Exchange System (MX).
Part four
Following the implementation of information security controls, this phase checks the effectiveness of those controls and assesses
whether they are working as intended. During the assessment, organisations may need to identify controls that are not functioning
as required and suggest areas where additional controls may be needed.
Assesses whether the information security controls that have been implemented, are working as intended, while establishing the
need to remove unnecessary controls or to include additional controls as required.
“Once you have understood what security assurance is, it is then necessary to define how to quantify and measure
it.”
How do I do it?
SAS 70 audits
SAS 70 stands for Statement on Auditing Standards 70, Service Organisations; it is produced by the American Institute of Certified Public
Accountants. SAS 70 does not provide a list of controls that should be in place. The organisation being audited provides a list of controls to be
audited and the auditor forms an opinion about the controls based on the evidence collected.
The International Auditing and Assurance Standards Board have developed and released a ‘global’ version of SAS 70, termed ISAE (International
Part four
Standard on Assurance Engagements) 3402. The standard is not designed to replace country-specific standards but to provide a single assurance
standard with consistent reporting for global organisations.
The ISF’s Security Audit of Business Applications report cover SAS 70 audits and ISAE 3402 in more detail. These reports are available on the ISF’s Member
Exchange System (MX).
3.3c Review risk assessments, residual risks and risk treatment decisions by considering any changes to: 4.2.3d
• business objectives
• systems, networks and applications
• threats and vulnerabilities
• control effectiveness
• legal and regulatory obligations
• the overall environment.
3.3d Review the scope of the security assurance process on a regular basis to ensure that the scope remains appropriate and 4.2.3e
risks are mitigated throughout the process. 4.2.3f
What is it?
The final phase of an information security assurance process focuses on identifying areas where each of the other phases can
be improved. The agreed outcomes from this phase should be applied to all security assurance processes that have been
implemented enterprise-wide, so that improvements can be applied consistently to all parts of the organisation.
Increases the level of information security assurance provided to senior management by considering aspects that worked well,
highlighting weaknesses and assessing the need for alternative approaches to improve the effectiveness of security controls based
on information risk.
How do I do it?
4.2b Monitor the security assurance process on a continuous basis to: 4.2.4d
• discover whether changes to the security assurance process have been implemented effectively
• identify future improvements.
ISF Members suggested during the project workshops that this phase is often the most important as it has an impact
on the ongoing success of information security assurance processes, particularly when trying to replicate successful
processes in other parts of the organisation.
Conclusion
In summary, security assurance can help an organisation to provide evidence to senior management that information risks are
being managed enterprise-wide. This can be achieved by the successful implementation of a security assurance programme,
supported by risk-based security assurance processes and specialised activities.
Drivers for the information security function setting up a security assurance programme, which have been identified in this report,
include:
Creating an effective security assurance programme will help an organisation achieve these drivers in practice when the
programme is implemented enterprise-wide.
The entire security assurance programme needs to be flexible to accommodate changes when identifying security requirements,
implementing controls and monitoring their effectiveness.
Members attending the project workshops spent a great deal of time discussing practical ways to help make a security assurance
programme work in an effective manner across the enterprise both now and in the future. In essence they believed that there
are five key steps to focus on, which are:
These steps are outlined in the table on the following page, together with practical hints and tips from workshop attendees.
Careful consideration of the topics covered in this report – used as input into the design of a comprehensive security assurance
programme – will help organisations provide evidence to senior management that information risks are being managed effectively
enterprise-wide, both today and in the future.
Part five
A. Link security assurance to > Position security assurance in conjunction with corporate governance and
information security governance
corporate governance and > Demonstrate how strategic governance decisions directly impact security
information security governance assurance activities
B. Implement a security assurance > Design a security assurance programme that consists of:
- security assurance processes (eg selecting and monitoring controls)
programme that covers the entire - specialised activities (eg compliance and risk management)
organisation - liaison with senior management (eg clear lines of communication and
reporting)
> Assign clear roles and responsibilities of the overall security assurance
programme and for each individual security assurance process
C. Deploy security assurance > Build a repeatable, sustainable security assurance process (such as an ISMS)
around the following phases:
processes for particular - identify security requirements
environments - implement control framework
- monitor and evaluate controls
- initiate improvements
> Select controls from a range of major information security-related standards
(eg ISF’s The Standard of Good Practice for Information Security, ISO/IEC
27002 and COBIT)
D. Implement specialised activities > Understand the importance of specialised activities (eg security metrics, testing
and assessments) in a security assurance programme to make it successful
to provide consistency and ensure > Ensure that there are no gaps or overlaps in security arrangements
coverage enterprise-wide enterprise-wide
> Review the overall programme to ensure that security assurance is provided in
E. Prepare for new challenges in the an effective manner
future > Implement a flexible, proactive security assurance programme that can continue
to achieve business objectives in a rapidly changing business environment
> Keep abreast of new developments in corporate governance (eg changes to
existing corporate governance codes) and security governance (eg working
draft ISO/IEC 27014 – not yet available in the public domain)
The Information Security Forum acknowledges and thanks the following Member representatives for their participation in the
meetings that have helped form the basis of this project.
The views, opinions and comments in this report are not necessarily those of work group participants or
Member organisations.