CASES.LU

Knowhow

The CISO Approach

In brief

Securing information is far from being a technical issue for an organization. Indeed, technical activities are only one aspect of an approach that, in order to be successful, must cover the activities of the company as a whole. Before putting in place procedures or technical measures to increase the safety of an organization, it is important to carry out a risk analysis (risk management) and write a security policy.

The security policy is used to formalize and coordinate all organizational and technical security procedures of the organization. Writing a security policy is a tedious task. We do not advise small businesses to approach them, and instead recommend moving forward with a view to continuous improvement, a short and concise document at a time, to gradually develop the sectoral procedures and policies that they have in place. Not needed anymore.

The common thread for the development of a security policy consists of one side in a set of good practices (ISO / IEC 27001 and ISO / IEC 27002), and the other in the analysis and risk assessment. Indeed, any organization must ensure that behavioral, organizational and technical measures are put in place where they will be quickly and truly effective.

In any case, it is advisable to choose an approach adapted to the criticality size of the assets and the maturity of the organization.

Security Charter

Defining and enforcing a security policy is the first step toward managing security. To ensure its success, it must meet the specific security needs of the organization. A risk analysis, even a summary, must necessarily precede this process. Without this analysis, management will not be able to understand which assets to protect in priority. In order to prevent the most dreaded impacts, management needs to identify the most important threats as well as the vulnerabilities that are most easily exploited.

The implementation of a charter must be accompanied by a presentation to employees who will live with the measures proposed daily. Without training on their part, any charter risks being ignored, and thus losing its usefulness.

Security policy

After the identification of the major risks for the organization (risk management), the management can, with a view to continuous improvement, go beyond ‘a simple security charter. It will put in place a real policy as well as specific procedures.

The implementation of a security policy, even rudimentary, will allow management to begin the organization of security. It will be defined in formal procedures, the obligations and responsibilities of each, as well as processes related to the security of information.

It is not necessary at this stage to start with the implementation of a comprehensive security policy. Safeguarding an organization is an ongoing process (Design, Implementation, Evaluation / Control and Improvement), implemented on the basis of security measures, evaluated in Impact the most feared, threats the most likely and vulnerabilities the most important.

Design

This first step aims to correctly define the scope and context of the future system. It must also make it possible to identify and evaluate risks in order to develop a management plan. (It can not, however, replace the risk analysis that must be done beforehand.

The realization step consists mainly of applying the security policy created in the previous step. Organizational and technical measures are put in place, behavioral measures are applied by staff.

Evaluation and control

The evaluation systems must have been described in the safety manual. The goal is to ensure that the procedures put in place work as intended. These evaluations can be of several types:

  • regular audits done as part of daily activities;
  • Automatic controls performed with software tools to create reports;
  • comparison with other organizations;
  • carrying out planned formal audits (“risk assessment”);
  • revision by the management.

If evaluations and controls reveal inadequacies in certain procedures, corrections must be made.

Improvement

The actions that will have been decided in the previous step will have to be implemented, ie:

  • at the level of the security system itself, as for example by appointing a (new) person responsible for all or part of the system;
  • at the level of the operational procedures which will have been deduced, for example by the implementation of a different data backup procedure (and obviously more adapted);
  • at the tools level, such as the purchase of an antivirus tool.

Content of the security policy

The security policy should contain the following documents:

Section 1. Security Policy

  1. Management Commitment
  2. Review and evaluation

Section 2. security organization

  1. Assignment of responsibilities
  2. Authorization Procedure for Adding Information Processing Tools
  3. Tips from a specialist
  4. Independent Review of Information Security
  5. Third party access and outsourcing

Section 3. Classification and Resource Control

  1. Classification and responsibility of resources

Section 4. Human aspects

  1. Security as mission
  2. Training and Information
  3. Response to Security Incidents and Malfunctions

Section 5. Physical and Environmental Security

  1. Physical security perimeter
  2. Rules in scope
  3. Electrical Equipment Safety
  4. Maintenance
  5. Off-Premise Security
  6. Disposal or re-use of equipment
  7. Offices in order

Section 6. Operational aspects and communications

  1. Documented Procedures
  2. Separation of development and production environments
  3. External resource management
  4. Protection against malware
  5. Data Backup
  6. Media security during transport
  7. E-mail

Section 7. Access Control

  1. Access Control Policy
  2. Access Rights Management
  3. Password Management
  4. Using external networks
  5. Connecting from the outside
  6. Network Separation
  7. Login procedure

Section 8. Systems Development and Maintenance

  1. Using encryption
  2. The electronic signature

Section 9. Security Incident Management

  1. Reporting events related to information security
  2. Incident Management and Information Security Enhancements
  3. Analysis of Obligations with Obligations

Section 10. Business Continuity Management

  1. Continuity of operation

Section 11. Compliance

  1. Identification of applicable legislation
  2. Intellectual Property
  3. Protection of Operational Data
  4. Protection of personal data
Table of Contents