Information security management_ ITIL 4 Practice Guide
Information security management_ ITIL 4 Practice Guide
This document provides practical guidance for the information security management
practice.
Table of Contents
1. About this document
2. General information
7. Important reminder
8. Acknowledgements
the practice’s processes and activities and their roles in the service value chain
2. General information
Key message
Definition: Confidentiality
The prevention of information being disclosed or made available to unauthorized
entities.
Confidentiality is the first thing that many people think of when they consider
information security. People and organizations want to ensure that their secrets remain
secret, and that their personal or business information is not misused.
Definition: Availability[1]
If the information is not available when and where it is needed, then the organization is
unable to conduct its business.
Definition: Integrity
Incorrect information may be worse than not having any information at all. For example,
if a bank incorrectly believes that a customer has a large amount of money in their
account and allows them to withdraw this, the bank might suffer from a significant loss.
Definition: Authentication
Verification that a characteristic or attribute which appears or is claimed to be true, is in
fact true.
Authentication is used to establish the identity of people and things. For example:
Usernames and passwords are often used to authenticate people, although more
rigorous authentication using biometrics and security tokens is often preferred.
Definition: Non-repudiation
Providing undeniable proof that an alleged event happened, or an alleged action was
performed, and that this event or action was performed by a particular entity.
Non-repudiation has been used in business transactions since before the existence of IT
systems and services. Traditionally, a signature would be used, and if a higher level of
proof was needed then this signature might be notarized. Information security relies on
non-repudiation so that transactions can occur. This is essential to preserve the integrity
of information.
Definition: Asset
A threat is any potential event that could have a negative impact on an asset.
These terms are related in the following way: Threat actors exploit vulnerabilities to
have an impact on assets.
Risk Definition
management
term
Risk A possible event that could cause harm or loss, or make it more
difficult to achieve objectives. It can also be defined as an
uncertainty of the outcome, and can be used in the context of
measuring the probability of positive outcomes as well as negative
outcomes.
Risk treatment Actions taken to treat a risk. Risk treatment options are:
Risk avoidance: preventing the risk by not performing the risky
activity
Risk modification: implementing controls to reduce the likelihood or
impact of the risk
Risk sharing: reducing the impact by passing some of the risk to a
third party
Risk retention: intentionally deciding to accept the risk because it is
below an acceptable threshold (and within the risk appetite of the
organization).
Residual risk The risk that remains after the application of controls
2.3 Scope
The purpose of the information security management practice, as described in section
2.1, is to “protect the information needed by the organization to conduct its business”.
This information may be stored and processed on information systems, but equally it
may be recorded on paper, or communicated in speech. This practice is concerned with
the confidentiality, integrity, and availability of this information, regardless of where and
how it is stored and processed. Although the focus is on information, this practice is
concerned with all four dimensions of service management.
Each organization must define the scope of its information security management
practice, which will typically include:
client devices, such as phones, laptops, and tablets, including: all hardware, firmware,
software, and applications
IoT devices, which typically have network connectivity and processing capabilities
and might also have sensors and actuators which interact with the physical world
business processes
people, including understanding the risks they pose and how these risks are
managed
partners and suppliers who play a part in the provision, management, or support of
services
Within this scope, the information security management practice should ensure that:
risks that could impact these assets are identified and analysed
Activity Practice
A practice success factor (PSF) is more than a task or activity, as it includes components
of all four dimensions of service management. The nature of the activities and resources
of PSFs within a practice may differ, but together they ensure that the practice is
effective.
embedding information security into all aspects of the service value system.
Information security management policies and plans may address the following aspects:
access control
password control
malware protection
information classification
remote access
intellectual property
The identification of information security risks includes identifying all assets that are
within the scope of the service value system, and then identifying risks to those assets.
This can be supported by threat and vulnerability assessments, architecture and design
reviews, and many other techniques.
The analysis of information security risks includes ascertaining the likelihood of each
information security risk, and the potential impact of that risk. The data provided can
evaluate the cost, benefit, and ROI of potential controls.
The management of information security risks includes defining and managing the
controls, which manage the wide range of risks that might impact information security.
This is performed in conjunction with risk management and other risk-focused practices,
such as capacity and performance management, availability management, and service
continuity management practices. The agreed information security controls are often
implemented as part of other practices, such as service design, software development
and management, infrastructure and platform management, architecture management,
service request management, continual improvement, workforce and talent
management depending on the nature of the control.
The established policies and plans should drive behaviour and implement controls to
maintain a balance between:
Controls may involve any of the four dimensions of service management. For example:
value stream and process controls such as backup, patch management, or peer
review
The information security plans and controls should be tested to improve its readiness and
ability. Regular testing will result in the discovery of flaws and inefficiencies. The findings
could then be used to update the information security plans and controls.
Exercises should be conducted at planned intervals and when significant changes occur
in the policies, plans, and controls. The greater the impact of an information security
incident, the more often the exercises should occur.
2.4.4.2 Governance
Governance is essential for an effective information security management practice. Even
the smallest organization needs to establish the governance of this practice to:
monitor the organization to ensure that these requirements are being met.
For example, consider a value stream that creates a new or significantly changed service:
this step will include documenting service requirements for information security
in this step, consider the information security issues that could pose a risk to the
organization
design the new service to meet customer requirements (design and transition)
this step will include designing and architecting to meet security requirements
2.4.4.4 Practices
Every practice needs to include aspects of information security management. This could
relate to any of the four dimensions of service management.
Processes defined by a practice might need to include this practice’s activities. For
example, the deployment process might need to include checks to ensure that the
software components are untampered.
Roles defined by the practices might need to include skills and competences from this
practice. For example, a software developer might need the ability to design software
that meets defined security standards.
Information and technology used by a practice must meet security requirements and
often require embedded security controls. For example, a tool used for information
exchange in the incident management practice might need to be confidential, so staff
can see their organization’s incidents but not those of other organizations.
Partners and suppliers that support a practice must meet the organization’s information
security requirements. For example, a partner that provides service continuity
arrangements might need to provide assurance that their staff do not make use of data
that was provided to them as part of a continuity test.
All improvement activities, even those that have no specific information security
management practice content, should be assessed for their potential impact on
information security. This assessment should be a routine part of any improvement
activity.
Key metrics for the information security management practice are mapped to its PSFs.
They can be used as KPIs in the context of value streams to assess the contribution of the
practice to the effectiveness and efficiency of those value streams. Some examples of this
are given in Table 2.3.
The correct aggregation of metrics into complex indicators will make it easier to use the
data for the ongoing management of value streams, and for the periodic assessment and
continual improvement of the information security management practice. There is no
single best solution. Metrics will be based on the overall service strategy and priorities of
an organization, as well as the goals of the value streams to which the practice
contributes.
The contribution of the information security management practice to the service value
chain is shown in Figure 3.1.
Figure 3.1 Heat map of the contribution of the information security management
practice to value chain activities
3.2 Processes
Each practice may include one or more processes and activities that may be necessary to
fulfil the purpose of that practice.
Definition: Process
Many information security management practice activities are embedded into processes
from other practices. For example:
designing security into new and changed IT services is part of the service design
practice
ensuring that people are entitled to use a service before granting them access is part
of the service request management practice.
Minor security incidents are typically managed in the same way as any other incident,
following the incident handling and resolution process described in the ITIL incident
management practice guide. More significant security incidents might require specialist
management, which can be based on the process described here.
This process includes the following activities listed in Table 3.1 and transforms the
following inputs into outputs.
These activities might be performed with varying levels of formality by many people
within the organization.
Activity Example
Preparation Before a security incident occurs, the organization must perform
actions to prepare for potential future security incidents. This
includes:
Detection and
escalation
Information security incidents might be: detected by monitoring
tools, supported by correlation tools, and supported by security
incident and event management (SIEM) tools. Incidents may also
be detected by people; these may be reported to the service
desk, or to a security incident response team, depending on who
has detected the incident and the nature of the incident.
Triage and
analysis
Evidence might need to be preserved for possible use in future
court proceedings. To prevent contamination, forensic data must
be collected before any analysis is performed.
Containment
and recovery
The impacted systems and services are isolated from the internet
and/or from the rest of the organization. This enables further
analysis to occur, which simultaneously limits the risk of further
damage.
Post-incident Systems and services are monitored to ensure that the threat has
activity been removed. Lessons learned analysis is performed to identify
improvement opportunities. An incident report is created and shared
as appropriate.
3.2.2 Audit and review
Audit and reviews are regularly performed and follow a schedule. It might also be
triggered by a major incident, or by the findings from a threat assessment or vulnerability
assessment.
This process includes the activities listed in Table 3.3, and transforms the following inputs
into outputs.
Current controls
Vulnerability
assessment
information
Activity Example
Identify changes to
business,
Business processes are assessed to identify changes that
technology, or
could impact information security requirements.
threat environment
Create audit report An audit report is created based on the findings from the earlier
stages. This report includes high-level information that can be
provided to the governing body of the organization, as well as
detailed recommendations for new and improved controls.
Roles are described in the context of processes and activities. Each role is characterized
with a competency profile based on the model shown in Table 4.1.
establishing the overall information security strategy for the organization, based on
an understanding of the organizations business strategy, and the information
security risks that might impact this
overseeing the staff responsible for all other aspects of information security,
including:
People can also contribute to each of these in a negative way, if they don’t have the
appropriate skills, competence, and motivation. There are many things that can be done
to help ensure that everyone in the organization contributes to information security in a
positive way.
Many organizations have a dedicated IT security team, that provides expertise across the
whole of the organization, but it is also important to have information security expertise
in other IT teams. For example:
Service architects and service designers must be able to architect and design secure
IT services. They must possess enough knowledge and understanding to perform
much of the work themselves, even if they might require assistance from specialist
security staff.
Service desk staff must be able to recognize security incidents, and take appropriate
action based on the organization’s security policy and security incident response
plans.
All staff must be aware of their responsibility to detect common security attacks and
know how they should react to these attacks.
This information may take various forms. The key inputs and outputs of the practice are
listed in section 3.
Security incident
management
process
Very few services are delivered using only an organization’s own resources. Most, if not all,
depend on other services, often provided by third parties outside the organization (see
section 2.4 of ITIL Foundation: ITIL 4 Edition for a model of a service relationship).
Relationships and dependencies introduced by supporting services are described in the
ITIL practice guides for supplier management and service level management.
Partners and suppliers might provide critical products and service components. The
service provider needs to negotiate and agree information security requirements with
partners and suppliers to meet information security requirements.
Partners and suppliers might also provide information security services and solutions,
such as: vulnerability assessments, threat assessments, security incident management,
provision of security relevant infrastructure or applications, and so on. In this case, they
should also be involved in the testing and reviewing of these services and solutions.
If suppliers have access to the organization’s network, servers, or other resources, it could
be a security breach. This risk needs to be identified and controlled. Typically, this is
controlled with:
network isolation: preventing the supplier from accessing more sensitive parts of the
network
contractual terms with regular audits: ensuring the supplier understands what is
expected of them and meets these expectations.
7. Important reminder
Most of the content of the practice guides should be taken as a suggestion of areas that
an organization might consider when establishing and nurturing their own practices.
The practice guides are catalogues of topics that organizations might think about, not a
list of answers. When using the content of the practice guides, organizations should
always follow the ITIL guiding principles:
focus on value
8. Acknowledgements
AXELOS Ltd is grateful to everyone who has contributed to the development of this
guidance. These practice guides incorporate an unprecedented level of enthusiasm and
feedback from across the ITIL community. In particular, AXELOS would like to thank the
following:
8.1 Authors
Stuart Rance, Ana Cecilia Perez, Mauricio Corona
8.2 Reviewers
Dinara Adyrbayeva, Pavel Demin
References
1. https://www.iso.org/obp/ui/#iso:std:iso-iec:27001:ed-2:v1:en [Accessed
3rd February 2020]This definition is different from the one used for
the availability management practice. Service availability is defined
differently from the availability of information.
Sign up