ISC2 Canons of Ethics
Code of Ethics Canons:
3 essential elements of an information security program
3 essential elements of an information security program
6 Outcomes of Information Security Governance/Program Management
ACRONYM (RRAPS-V)
Information Security Framework Components
The Open Group Architecture Framework (TOGAF) Architecture Development Model (ADM) steps
The Open Group Architecture Framework (TOGAF) Architecture Development Model (ADM) -
Elements of a road map - a well developed strategy will have objectives, resources, and constraints defined; transform conceptual or logical architecture to a physical one; Initiatives must be planned, along with budgets, timetables, personnel, etc; should include various milestones such as KGIs, KPIs, and critical success factors (CSFs)
Steps to define Information Security Program road map
Enterprise Information Security Architecture - overall enterprise IT system design; EISA objective is to address related elements of business structure in addition to managing security technology
3 Basic Approaches -
4 EISA Domains
Objectives of Information Architecture
Objectives of Information Architecture -
*Serve as program development and road map
*implementing policies, strategic alignment, traceability, common language
Security Program Management and Administrative Activities
Security Program Management and Administrative Activities CONTD.
Security Program Management and Administrative Activities CONTD.
Security Program Services and Operational Activities
Security Program Services and Operational Activities
Security Program Services and Operational Activities contd
Security Program Services and Operational Activities contd
If there are no results, review inconclusive
Security Program Services and Operational Activities contd
Security Program Services and Operational Activities contd
5. Management of Security Technology - organizations have technology that require effective mgmt and operation if optimal value delivery and resource management are to be achieved; mature organizations are typically constrained to legacy architecture;
6. Due Diligence - “the standard of due care”; the idea that there are steps that should be taken by a person of similar competency in similar circumstances; ISMs should ensure basic components of a reasonable security program in place (i.e. senior mgmt support, comprehensive policies, appropriate training, periodic risk assessments, etc)
7. Compliance Monitoring and Enforcement - compliance is useless if it isn’t enforced; ISMs should enforce by developing procedures to track and monitor compliance requirements
Security Program Services and Operational Activities contd
8. Assessment of Risk and Impact
Security Program Services and Operational Activities contd
8. Assessment of Risk and Impact - primary responsibility of ISM and purpose of program is to manage risk to acceptable levels; The following objectives help to achieve that goal:
Security Program Services and Operational Activities contd
9. Outsourcing and Service Providers
Security Program Services and Operational Activities contd
9. Outsourcing and Service Providers - security requirements are similar (3rd party vs outsourcing) but ownership is different; ISM is process owner for outsourced services; Economics are primary driver for outsourcing; Extended contracts offer little economic benefit which eliminates any initial cost savings; over a short time, control may require specific level of services but may not need it, however cost stays the same; or over a long term, outsourced services may cost more requiring more services then initially stated; must consider privacy laws; ISM should train external personnel; good way to choose vendor is by comparing their standards to the organization’s standards;
Security Program Services and Operational Activities contd
Security Program Services and Operational Activities contd
Five essential characteristics:
Other Service Models
Security Program Services and Operational Activities contd
Security Program Services and Operational Activities contd
Security Program Services and Operational Activities contd
Security Program Services and Operational Activities contd
Security Program Services and Operational Activities contd
12. Controls and Countermeasures
Security Program Services and Operational Activities contd
12. Controls and Countermeasures -