320 likes | 1.57k Vues
Agenda. COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks . Chapter 3. Enabler : Processes Chapter 4. Enabler : Organisational Structures Chapter 5. Enabler: Culture, Ethics and Behaviour
E N D
Agenda • COBIT 5 ProductFamily • Information Security • COBIT 5 content • Chapter 2. Enabler: Principles, Policies and Frameworks. • Chapter 3. Enabler: Processes • Chapter 4. Enabler: OrganisationalStructures • Chapter 5. Enabler: Culture, Ethics and Behaviour • Chapter 6. Enabler: Information • Chapter 7. Enabler: Services, Infrastructure and Applications • Chapter 8. Enabler: People, Skills and Competencies • Appendices • Appendix A. Detailed Guidance: Principles, Policies and Frameworks Enabler • Appendix B. DetailedGuidance: ProcessesEnabler • Appendix C. DetailedGuidance: OrganisationalStructuresEnabler • Appendix D. Detailed Guidance: Culture, Ethics and BehaviourEnabler • Appendix E. Detailed Guidance: Information Enabler • Appendix F. DetailedGuidance: Services, Infrastructure and ApplicationsEnabler • Appendix G. Detailed Guidance: People, Skills and Competencies Enabler • Appendix H. DetailedMappings
Information Security ISACA defines information security as something that: • Ensures that within the enterprise, information is protected against disclosure to unauthorisedusers (confidentiality), improper modification (integrity) and non-access when required (availability). • Confidentialitymeans preserving authorised restrictions on access and disclosure, including means for protecting privacy and proprietary information. • Integritymeans guarding against improper information modification or destruction, and includes ensuring informationnon-repudiation and authenticity. • Availability means ensuring timely and reliable access to and use of information.
Enabler: Principles, Policies and Framework 2.1 Principles, Policies and Framework Model 2.2 Information Security Principles 2.3 Information Security Policies 2.4 Adapting Policies to the Enterprise’s Environment 2.5 PolicyLifeCycle
Appendix A • Informationsecuritypolicy • Access control policy • Personnelinformationsecuritypolicy • Physical and environmental information security policy • Incidentmanagementpolicy • Business continuity and disaster recovery policy • Assetmanagementpolicy • Rules of behaviour (acceptable use) • Informationsystemsacquisition, software development and maintenancepolicy • Vendormanagementpolicy • Communications and operationmanagementpolicy • Compliancepolicy • Riskmanagementpolicy
Enabler: Process 3.1 The Process Model 3.2 Governance and Management Processes 3.3 Information Security Governance and Management Processes 3.4 Linking Processes to Other Enablers
Enabler: OrganisationalStructures 4.1 Organisational Structures Model 4.2 Information Security Roles and Structures 4.3 Accountability Over Information Security
Enabler: Culture, Ethics and Behaviour 5.1 Culture Model 5.2 Culture Life Cycle 5.3 Leadership and Champions 5.4 Desirable Behavior
Enabler: Information 6.1 Information Model 6.2 Information Types 6.3 Information Stakeholders 6.4 Information Life Cycle
Enabler: Services, Infrastructure and Applications 7.1 Services, Infrastructure and Applications Model. 7.2 Information Security Services, Infrastructure and Applications
Appendix F • Providea securityarchitecture. • Providesecurityawareness. • Provide secure development (development in line with security standards). • Providesecurityassessments. • Provide adequately secured and configured systems, in line with security requirements and security architecture. • Provide user access and access rights in line with business requirements. • Provide adequate protection against malware, external attacks and intrusion attempts. • Provideadequateincident response. • Providesecuritytesting. • Provide monitoring and alert services for security-related events.
Enabler: People, Skills and Competencies 8.1 People, Skills and Competencies Model 8.2 Information Security-related Skills and Competencies
Appendix H • ISO/IEC 27000 series provides a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an ISMS: • Security- and risk-related processes in the EDM, APO and DSS domains • Various security-related activities within processes in other domains • Monitoring and evaluating activities from the MEA domain • The ISF 2011 Standard of Good Practice for Information Security is based on the ISF Information Security Model four main categories: information security governance, information security requirements, control framework, and information securitymonitoring and improvement. • Guide for Assessing the Information Security Controls in Federal Information Systems and Organisations, NIST—The purpose of this guide is to provide direction with regard to information security controls for executive agencies of the US government