Lecture 1 - Introduction ISMS
Lecture 1 - Introduction ISMS
Bild 1
CONTENT
• Course Information
• Course Design
• Course Materials
• Information Security Management system
• Analysis - Business and environment
Bild 2
COURSE INFORMATION
Bild 3
COURSE INFORMATION
Bild 4
COURSE OBJECTIVES
Bild 5
CONTENT OF THE COURSE
Bild 6
COURSE ADMINISTRATION
• Course coordinator,
§ Rose-Mharie Åhlfeldt, Associated professor, University of Skövde
• Examiner
• Marcus Nohlberg, Senior Lecturer, University of Skövde
Bild 7
COURSE DESIGN
Bild 8
COURSE DESIGN
Bild 9
SUPERVISIONS
Bild 10
THE ASSIGNMENT
Bild 11
SEMINARS
Bild 12
EXAMINATION
Bild 13
INFORMATION SECURITY
MANAGEMENT SYSTEMS
(ISMS)
Bild 14
INFORMATION SECURITY MODEL
Business goals
Bild 15
SYSTEMATIC INFORMTION SECURITY WORK
– INFORMATION SECURITY MANAGEMENT SYSTEM
Through a systematic
work on information
security, organizations
can increase the quality
and trust of their
business.
Bild 16
SYSTEMATIC INFORMATION SECURITY WORK–
INFORMATION SECURITY MANAGEMENT SYSTEM
Bild 17
SYSTEMATIC INFORMATION SECURITY
WORK
Bild 18
FROM STANDARDS TO A METHOD
HOW can it be
WHAT to do
done
Bild 19
AIMS AND OBJECTIVES
Organi-
sation
Bild 20
THE METHOD FOR SYSTEMATIC
INFORMATION SECURITY WORK
PURPOSE AND GOALS
Bild 21
PARTS OF THE METHOD
Bild 22
IDENTIFY AND ANALYSE
• Business
• The business analysis involves identifying the organisation's
essential information assets as well as mapping internal
stakeholders (such as decision makers, object owners,
employees, support units) and prerequisites (such as goals,
strategies, organizational structure, infrastructure)
• External
• The external analysis includes identification of legal
requirements and mapping of external stakeholders (such as
owners, customers, suppliers, reviewers) and prerequisites
(such as technical, social, environmental, political)
• Risk
• The risk analysis identifies information security risks and can be
used enterprise-wide or for a specific object
• GAP
• Analysis is based on the selected security control, and refers to
the gap between the identified need for protection and the
current status of the respective security control.
Bild 23
DESIGN
Bild 24
USE
• Goal fulfilment
• Provide support for how the organisation meets the strategic
and short-term goals for information security.
• Evaluate
• Provides support for how information security in general is
appropriately designed, has intended effect, and that
security measures exist and function satisfactorily.
• Management review
• The management's review means that the top management
reviews the organisation's systematic information security
work and its management to ensure its continued suitability,
adequacy and effectiveness.
Bild 26
IDENTIFY AND ANALYSE
BUSINESS AND EXTERNAL ENVIRONMENT
Bild 27
IDENTIFY AND ANALYSE
• Business
• The business analysis involves identifying the organisation's
essential information assets as well as mapping internal
stakeholders (such as decision makers, object owners,
employees, support units) and conditions (such as goals,
strategies, organizational structure, infrastructure)
• External
• The external analysis includes identification of legal
requirements and mapping of external stakeholders (such as
owners, customers, suppliers, reviewers) and conditions (such
as technical, social, environmental, political)
• Risk
• The risk analysis identifies information security risks and can be
used enterprise-wide or for an individual object
• GAP
• Analysis is based on the selected security control, and refers to
the gap between the identified need for protection and the
current status of the respective security control.
Bild 28
BUSINESS ANALYSIS – INTERNAL
PERSPECTIVE
• In order to design the governance of a organisation’s
information in a way that takes advantage of the current
situation requires a different type of analysis. This guide
focuses on the internal perspective. It is its own activities which
are analysed in three parts:
• internal stakeholders
• internal conditions
• information assets
Bild 29
INTERNAL STAKEHOLDERS
Bild 30
EXAMPLE ON STAKEHOLDERS AND
REQUIREMENT
Category Stakeholders Requirements/role
Bild 33
STEP 2 - INTERNAL STAKEHOLDERS
• With starting point in table, and with help of own experiences or other
sources, identify every important stakeholders.
Bild 34
STEP 3 - ROLE
• Discuss their role, how they affect and are affected of, information
security and its governance.
Bild 35
STEP 4 - REQUIREMENT
• Identify needs, expectations and requirements with help of
discussions, meetings, interviews etc. Document in the tool.
Bild 36
INTERNAL PREREQUISITES
Bild 37
EXAMPLE ON INTERNAL PREREQUISITES
AND IMPACT
Internal prerequisite Type of prerequisite
Policy Objectives Strategies Existing policy, goals and strategies tell where the
business is heading. Information security's governance
and objectives must be adapted accordingly.
Business management Existing management and planning of the business, such
as IT management model, business planning process,
budget process etc, affects the management of information
security.
Organisation structure The structure tells about responsibilities. roles, reporting
paths and decision making. The structure governing the
conditions for the responsibility and authority for the Bild 38
information security can be designed.
EXAMPLE ON INTERNAL PREREQUISITES
AND IMPACT
Internal prerequisite Type of prerequisite
Organisation culture The culture tells about what works and what is expected regarding
the management of information security. Some business may be
familiar with the vague goal orientation while others require detailed
control.
Business processes Both processes for business management and other processes such
as purchasing, recruitment, product- and service development,
marketing, delivery, complaints etc., affect and are affected by
information security management.
Resources Mainly refers to access to personnel and financial resources and
their impact.
Standards, Guidelines Existing standards that the organization has chosen to work on and
Bild 39
how they affect the management of information security.
EXAMPLE ON INTERNAL PREREQUISITES
AND IMPACT
Internal prerequisite Type of prerequisite
Bild 41
PROCEDURES FOR ANALYSIS
2. Internal prerequisites: Based on the table below and using the own
experience or from other sources, identify all important internal prerequisites.
Bild 42
PROCEDURES FOR ANALYSIS
3. Impact: Discuss the prerequisites, how they affect and are affected by,
information security and governance.
Bild 43
PROCEDURES FOR ANALYSIS
4. Requirements: Identify the impact and its importance on how information
security management should be designed, for example, by means of
document review, discussion, meetings, interviews etc. Documenting this in
the tool.
Bild 44
INFORMATION ASSETS
Bild 45
INFORMATION ASSETS
1. Tool: Use Excel sheet Tool Analyse Business, tab 3 Information Assets.
2. Inventory: Identifying essential/critical information assets.
Bild 46
INFORMATION ASSETS
• Document the following (1):
• ID: For easy identification it is recommended that each information asset is assigned a
unique identifier.
• Name: Enter the name of the information assets, such as "Agresso” or “Subscriber data".
• Description: Describe the asset in terms of use, technology, etc. For example, ”Salary
system" or "CRM system delivered by X as a cloud service".
Bild 47
INFORMATION ASSETS
• Document the following (2):
Bild 48
SUMMARY
• Business analysis
• Important to take it step by step
• Start building from the beginning - everything will not be ready right
away
• The steps of the method - Analyse business
1. Internal stakeholders
2. Internal prerequisites
3. Information assets
4. The tool to support
Bild 49
IDENTIFY AND ANALYSE
THE ENVIRONMENT
Bild 50
IDENTIFY AND ANALYSE THE
WORLD AROUND US
• Business environment is referred to everything that lies
outside the organisation’s direct control, but either affects or is
affected by the information security of the business.
Bild 51
EXTERNAL STAKEHOLDERS
Bild 52
EXAMPLES OF EXTERNAL
STAKEHOLDERS
Category External stakeholders (example)
Bild 54
EXTERNAL PREREQUISITES
Bild 55
EXAMPLES OF EXTERNAL
PREREQUISITES
External prerequisite Type of impact (example)
Bild 57
EXAMPLES OF EXTERNAL
PREREQUISITES
External prerequisite Type of impact (example)
Bild 59
EXAMPLES OF EXTERNAL
PREREQUISITES
External prerequisite Type of impact (example)
Bild 60
EXTERNAL PREREQUISITES
Bild 61
IDENTIFY AND ANALYSE THE
WORLD AROUND US
• Legal requirements refer to requirements related to information security
posed in different types of provisions as laws, regulations, official
regulations and local municipal regulation.
• Certain legal requirements apply to all operations national or global,
while other requirements are limited to one certain industry or a type of
organisation.
• These requirements can be broadly divided into two categories;
• requirements on how the information security work must be designed
• requirements on how the protection for certain types of information should
be designed.
• The analysis identify essential legal requirements so that these can be
considered in the design of information security in the organisation.
Bild 62
DIFFERENT REQUIREMENTS FOR
DIFFERENT ORGANISATIONS
• Which legal requirements for your organisation will depend on,
among other things:
• type of organisation (e.g. private, public)
• industry (e.g. water ISP)
• what information the organisation manage (financial
information, trade secrets, security, proprietary information,
personal information).
Bild 63
WORK WITH LEGAL EXPERTISE
Bild 64
WORK WITH LEGAL EXPERTISE
Bild 65
COMPLIANCE WITH LEGAL
REQUIREMENTS?
• Analyse how you will implement these requirements on a overall
level.
• This discussion, for example, involve different types of security
controls, or on how the requirements will affect how information
security is managed and organised in your organisation.
• Since some legal requirement is relatively general, while others
are more specific and pretty narrow, it is not always directly
expressed in the legal text what needs to be done.
• Therefore, the legal requirements must be discussed and
interpreted. To do this analysis in a good way require expertise of
including organisation, information security and law.
Bild 66
PROCEDURES
Bild 67
PROCEDURES
Bild 68
LEGAL REQUIREMENTS
Bild 69
IDENTIFY AND ANALYSE THE
WORLD AROUND US
• Initially, it is important to not get stuck too long in the
analyses.
• As a start of the work, these analyses of different parts of
the environment can be implemented relatively quickly
and in an overall level.
• They are still the basis for further work.
• Therefore, return to the analysis results, update them
with new information and fill in more details if needed.
Bild 70
SUMMARY
• Environment analysis
• Important to take it step by step
• Start building from the beginning - everything will not be ready
right away
• The steps of the method - Analyse environment
1. External stakeholders
2. External prerequisites
3. Legal requirements
Bild 71
A MANAGEMENT SYSTEM (ISMS)
- A CONTINUOUS IMPROVEMENT PROCESS
Act Plan
Check Do
Bild 72
72