Article Saudi Bonyan

Tahseen AlAktaa

Chief information officer

Information Security Management System These are the ways in which an ISO27k ISMS will typically benefit the organization.


Information security risk reduction

  • Strengthens existing information security control environment by (re-)emphasizing business information security control requirements, upgrading current information security policies, controls etc. and providing stimulus to review and where necessary improve information security controls periodically – risk reduction
  • Comprehensive, well-structured approach increases the likelihood that all relevant information security threats, vulnerabilities and impacts will be identified, assessed and treated rationally – risk reduction
  • Professional, standardized and rational risk management approach gives consistency across multiple information/communications systems (ICT) and business processes over time, and addresses information security risks according to their relative priorities – risk reduction
  • Increases our ability to transfer certain risks selectively to insurers or other third parties, and may facilitate negotiating reduced insurance premiums as key controls are implemented and managed – cost saving
  • Managers and staff become increasingly familiar with information security terms, risks and controls – risk reduction


Benefits of standardization

  • Provides a security baseline i.e. a solid platform of basic, almost universally required information security controls on which to implement specific additional controls as appropriate – cost saving
  • An embodiment of good practices, avoids ‘re-inventing the wheel’ – cost saving
  • Avoids having to specify the same basic controls repeatedly in every situation – cost saving
  • Is generally applicable and hence re-usable across multiple departments, functions, business units and organizations without significant changes – cost saving
  • Allows the organization to concentrate effort and resources on specific additional security requirements necessary to protect particular information assets – cost saving
  • Based on globally recognized and well respected security standards – brand value
  • ISO27k standards suite is being actively developed and maintained by the standards bodies, reflecting new security challenges (such as BYOD and cloud computing) – brand value
  • Formally defines specialist terms, enabling information security issues to be discussed, analyzed and addressed consistently by various people at different times – cost saving
  • Allows unnecessary, inappropriate or excessive controls to be relaxed or removed without unduly compromising valuable information assets – cost saving
Being risk-based, the ISO27k approach is flexible enough to suit any organization, as opposed to more rigid and prescriptive standards such as PCI-DSS – cost saving


Benefits of a structured approach

  • Provides a logically consistent and reasonably comprehensive framework/structure for disparate information security controls – cost saving
  • Provides the impetus to review systems, data and information flows with potential to reduce overhead of duplicated and other unnecessary systems/data/processes and improve the quality of information (business process re-engineering) – cost saving
  • Provides a mechanism for measuring performance and incrementally raising the information security status over the long term – cost saving and risk reduction
  • Builds a coherent set of information security policies, procedures and guidelines, tailored to the organization and formally approved by management – long term benefits


Benefits of certification1

  • Formal confirmation by an independent, competent assessor that the organization’s ISMS fulfills the requirements of ISO/IEC 27001 risk reduction
  • Provides assurance regarding an organization’s information security management capabilities (and, by implication, its information security status) for employees, owners, business partners, suppliers, regulators, auditors and other stakeholders, without requiring numerous individual evaluations, assessments or audits, or having to rely purely on management assertions and assumptions - cost saving and risk reduction
  • Positions the organization as a secure, trustworthy and well-managed business partner (similar to the ISO 9000 stamp for quality assurance) – brand value
Demonstrates management’s clear commitment to information security for corporate governance, compliance or due diligence purposes – cost saving and risk reduction


Benefits of compliance

  • ISO27k provides an overarching framework for information security management that encompasses a broad range of both external and internal requirements, leveraging the common elements – cost saving and risk reduction
  • Stakeholders or authorities may at some point insist that the organization complies with ISO27k as a condition of business or to satisfy privacy and other laws, whereas implementing it on our own terms and timescales is likely to be more cost-effective (e.g. we can prioritize aspects that offer the greatest business value, and take advantage of planned IT system or facility upgrades to improve security at minimal extra cost) – cost saving
  • Adopting generally-acknowledged good practices provide a valid defense in case of legal/regulatory enforcement actions following information security incidents – cost saving and risk reduction


Understanding the Goals of Information Security

Like so many things, the goals of information security are straightforward. They create the framework that is used for developing and maintaining a security plan. They’re remarkably easy to express but extremely hard to carry out. These goals are as follows:

Prevention Prevention refers to preventing computer or information violations from occurring; it is much easier to deal with violations before they occur than after. Security breaches are also referred to as incidents. When an incident occurs, it may be the result of a breakdown in security procedures. Incidents come in all shapes and sizes. Simple incidents include things such as losing a password or leaving a terminal logged on overnight. They can also be quite complex and result in the involvement of local or federal law enforcement personnel. If a group of hackers were to attack and deface your website, you would consider this a major incident. Ideally, your security procedures and policies would make you invulnerable to an attack; unfortunately, this isn’t usually the case. The better your prevention policies, however, the lower the likelihood of a successful attack occurring.

Detection Detection refers to identifying events when they occur. Detection is difficult in many situations; an attack on your system may occur over a long period before it’s successful. Incident detection involves identifying the assets under attack, how the incident occurred, and who carried it ut (or is still doing so). The detection process may involve a variety of complicated tools or a simple examination of the system log files. Detection activities should be ongoing and part of your information security policies and procedures.

Response Response refers to developing strategies and techniques to deal with an attack or loss. Developing an appropriate response to an incident involves several factors. If the incident was a probe, the attacker may have done no actual harm but may be gathering intelligence about your etwork or systems. These types of attacks may be random or targeted, and they usually cause little damage. Occasionally, an attack will be successful. When that happens, it is helpful to have a well-thought-out and tested plan you can use to respond, restore operation, and neutralize the hreat. It’s always better to have a set of procedures and methods in place to recover from an incident than to try to create those processes on-the-fly. These goals are an important part of setting benchmarks for an organization. You can’t allow these policies or goals to become insignificant. If you do, you and your organization are setting yourselves up for a surprise. Unfortunately, the surprise won’t be pleasant, and it may be very costly to deal with.


Comprehending the Security Process It helps to think of security as a combination of three Ps: processes, procedures, and policies. The security of information involves both human and technical factors. The human factors are addressed by the policies that are enforced in the organization as well as the processes and procedures your organization has in place. The technology components include the tools you install on the systems you work with. There are several parts to this process, and each is described in the following sections.

.