(Class Note) Module 11 - Security Reporting and Oversight
(Class Note) Module 11 - Security Reporting and Oversight
31/08/23
RMIT Classification: Trusted
Session Objectives
After reading completing the week contents, you should be able to :
Explain the importance of security reporting
Apply reporting mechanisms
31/08/23
RMIT Classification: Trusted
31/08/23
RMIT Classification: Trusted
31/08/23
RMIT Classification: Trusted
31/08/23
RMIT Classification: Trusted
31/08/23
RMIT Classification: Trusted
Strategy Report
The security strategy and the initiatives that comprise it should be reviewed
every year.
Strategic initiatives are also part of the “Plan” roadmap of the security program
as defined.
Taking stock of the progress of initiatives in the reporting framework is
important, because it can influence the priorities that the governing body
wants to establish.
When the report is being presented, questions regarding the reasons for
potential delay or lack of resources or even a change in strategic direction might
arise.
This is why the CISO should have readily available arguments explaining project
progress during the previous period.
This same type of reporting will be used as part of the security program review
process, especially in the “Monitor” activity.
31/08/23
RMIT Classification: Trusted
31/08/23
RMIT Classification: Trusted
Risks report
the risk management process includes reporting to bodies responsible for risk
treatment planning.
The report includes a mapping of all the risks with their attributes, a heat-map,
a table of factors influencing risks, and comments on the main events, trends,
and changes since the last revision.
Reporting for oversight or program adaptation purposes can be made with a
simplified presentation of the state of risks.
In this case, a heatmap with trends or evolutions of the risks and a matrix of
high risks containing an action plan and the state of progress can be used
This presentation highlights the most important risks, their treatment plan, and
their trend.
A comment may accompany this, especially if it is relevant to understanding
why a high risk has a “negative” trend.
31/08/23
RMIT Classification: Trusted
31/08/23
RMIT Classification: Trusted
Posture report
The report on security posture is intended to draw decision-makers’ attention
to weak points in the protection capacities in place.
Posture can be evaluated in different ways: for example,
By using a maturity model
Through a benchmarking study comparing the effectiveness of controls in similar
companies
By mandating an external audit
To present the posture and be able to reevaluate it in a repetitive way, it is
preferable to use a maturity model
The choice of the model depends on the desired level of abstraction or
focus when reporting to governing bodies.
A catalog of controls may already contain an assessment of current and desired
maturity.
31/08/23
RMIT Classification: Trusted
31/08/23
RMIT Classification: Trusted
Posture
Regardless of the model chosen to present the security posture, it should be
accompanied by supporting documents to better understand any differences in
current and desired maturity.
Thus, the compliance maturity gap in the preceding example may be due to a
new regulation in a geographical area where the company is present.
Benchmarking results can influence maturity ratings.
If we look at the previous cybersecurity example, a benchmarking study could
indicate that the level of maturity is lower than that of the competition, which
could potentially affect the company’s competitiveness.
Therefore, the desired level of maturity must be aligned with that of the
competition.
31/08/23
RMIT Classification: Trusted
Program report
a security program is composed of a set of operational controls and an
improvement plan with a roadmap of projects.
These projects mobilize resources, and their objectives must be justified
(explained).
Through its program, security achieves the following objectives:
the deployment of strategic initiatives
risk mitigation, improvement of the posture (capacity) of the protection system
reinforcement of compliance
the implementation of corrective measures requested by audits.
As a result, the four previous elements of the report, supplemented by
indicators on the effectiveness of controls and the status of ongoing projects,
will make it possible to present the project portfolio along with project status.
31/08/23
RMIT Classification: Trusted
31/08/23
RMIT Classification: Trusted
Governance Report
Report focuses on strengthes and weaknesses of governance as a means of maturity
assessment, communication and coordination for continuous improvement
Example of governance
self-assessment key
findings
31/08/23
RMIT Classification: Trusted
31/08/23
RMIT Classification: Trusted
31/08/23
RMIT Classification: Trusted
31/08/23
RMIT Classification: Trusted
Dashboard
Dashboard is primarily a realtime monitoring tool for certain events or metrics.
A dashboard is often consulted to track operational events, while a report is prepared for
review purposes at defined frequencies.
A security dashboard can be made up of various indicators, facilitating the monitoring of the
security system.
Project progress
Evolution of incidents
Follow-up of breaches of internal regulations
Statistics or indicators on access rights
Distribution of workloads by IS service (operations, projects, investigations, studies, etc.)
Internal or external events or incidents that may impact risk assessment
Number of investigations or forensic analyses
Follow-up awareness sessions
Follow-up of security control tests according to a pre-established plan
Trends in threat monitoring
31/08/23