You are on page 1of 7

naa

Information Security
Management Best Practice
Based on ISO/IEC 17799
The international information security standard provides a framework for ensuring
business continuity, maintaining legal compliance, and achieving a competitive edge

Rene Saint-Germain

S
ecurity matters have become Organizations today must deal with a clear, however, that to address all aspects
an integral part of daily life, multitude of information security risks. of security, organizations need to imple-
and organizations need to Terrorist attacks, fires, floods, earth- ment a more comprehensive approach
ensure that they are ade- quakes, and other disasters can destroy using a methodical compliance frame-
quately secured. While legis- information processing facilities and crit- work.
latures enact corporate governance ical documents. Theft of trade secrets Compliance is not always straightfor-
laws, more and more businesses are and the loss of information due to unex- ward. As META Group notes in its white
seeking assurance that their vendors pected computer shutdowns can cause paper, "Unraveling Security and Risk
and partners are properly protecting businesses to lose their commercial Regulation," legislation governing regula-
information assets from security risks advantage. The CCI/FBI Computer Crime tory requirements often lacks the speci-
and are taking necessary measures to and Security Survey states that total losses ficity organizations need to know how to
ensure business continuity. Security in the United States in 2004 as a result of comply. According to META Group,
management certification provides just computer security breaches reached companies and institutions affected by
such a guarantee, thereby increasing $141,496,560. Organizations often tackle such legislation must decide for them-
client and partner confidence. security issues as part of their efforts to selves which security controls are appro-
A number of best practice frame- comply with a variety of regulatory priate for their organizations.
works exist to help organizations requirements, such as the Sarbanes-Oxiey An increasing number of businesses,
assess their security risks, implement Act (SOX) and the Health Insurance moreover, are seeking to obtain security
appropriate security controls, and com- Portability and Accountability Act certification from third-party organiza-
ply with governance requirements as well (HIPAA). It is becoming increasingly tions, given that certification guarantees
as privacy and information security reg- that the controls implemented meet
ulations. Of the various best practice At the Core information security requirements.
frameworks available, the most compre- Certification enables organizations to
This article
hensive approach is based on the imple- comply with increasing demands from
mentation of the international informa- • Introduces various best practices financial institutions and insurance com-
tion security management standard, for implementing security controls panies for security audits. In addition, it
ISO/IEC 17799, and subsequent certifi- • Lists the 10 security domains of builds trust in an organization's capacity
cation against the British standard for ISO/IEC 17799 to implement appropriate security con-
information security, BS 7799. This ISO • Describes the benefits of imple- trols to manage and protect confidential
17799/BS 7799 frame work is the only menting ISO/IEC 17799 client and business information.
one that allows organizations to undergo Some best practices that facilitate the
• Talks about security trends
a third-party audit. implementation of security controls

60 The Information Management Journal . July/August 2 0 0 5


include Control Objectives for
Organizational
Information and Related Technology
(COBIT), ISO/IEC 17799/BS 7799,
Information Technology Infrastructure Security Policy
Library (ITIL), and Operationally
Critical Threat, Asset and Vulnerability
Organizational
Evaluation (OCTAVE). Focus on the
Security
ISO/IEC 17799 standard is warranted,
given that it provides the most compre- Asset Classification 1
Access Control
hensive approach to information securi- and Control 1
ty management. The other best practices
focus more on IT governance, in gener-
al, or on the technical aspects of infor-
mation security. (See Table 3.)Moreover,
/ 1
Personnel Security
Compliance

Physical and
\

Environmental Security
ISO 17799/BS 7799 is the only best prac-
tice framework that allows organiza- System Development Conmunicsflons and Business Continuity
tions to undergo a third-party audit and and Maintenance Operations Management Management
become certified. Implement-ing an Operational
overarching compliance framework
using ISO/IEC 17799 and BS 7799
requires a methodical information secu- ••iMil
rity management system that facilitates
Figure 1: The Ten Domains of ISO/IEC 17799
the planning, implementation, and doc-
umentation of security controls and ments and demonstrate their commit- cal. It includes 36 control objectives, con-
ensures a constant process review. ment to securing information assets and sisting of general statements of security
to protecting the confidentiality of per- goals for each of the 10 domains. The stan-
ISO/IEC 17799: An Information sonally identifiable customer informa- dard also includes 127 controls that identi-
Security Management Standard tion. They also provide their business fy specific means for meeting the control
ISO/IEC 17799:2000 Information Tech- partners and clients with greater confi- objectives. Organizations implement these
nology - Code of Practice for Information dence in their capacity to prevent and rap- controls to mitigate the risks they have
Seairity Management defines information idly recover from any interruptions to identified. The ISO 17799/BS 7799 securi-
security as the preservation of informa- production or service levels. ty domains are:
tion confidentiality, integrity, and avail- Proper security ultimately results in
1. Security Policy - Demonstrate man-
ability. The goals of information security minimizing business damage. Imple-
agement commitment to, and sup-
are to ensure business continuity, to main- menting ISO/IEC 17799 involves putting
port for, information security.
tain legal compliance, and to achieve com- in place a cost-effective execution plan
petitive edge. For example, organizations that includes appropriate security controls 2. Organizational Security - Develop a
with a committed client base and an estab- for mitigating identified risks and protect- management framework for the
lished partner network need to demon- ing the confidentiality, integrity, and avail- coordination and management of
strate to their partners, shareholders, and ability of an organization's information information security in the organiza-
clients that they have identified and meas- assets. It also involves ongoing monitoring tion; allocate information security
ured their security risks and implemented to ensure that these controls remain effec- responsibility.
a security policy and controls that will tive. In sum, ISO/IEC 17799 enables
3. Asset Classification and Control -
mitigate these risks. Such controls might organizations to manage information
Maintain an appropriate level of
include, for example, the use of digital cer- security as a coherent and global business
protection for all critical or sensitive
tificates for electronic transactions, the process that extends beyond the very nar-
assets.
drafting and testing of business continuity row approach to security that focuses
plans, the use of secure backup media and uniquely on technical aspects or comput- 4. Personnel Security - Reduce the
the implementation of appropriate access er infi-astructure. risk of error, theft, fraud, or misuse
controls. ISO/IEC 17799 comprises 10 security of computer resources by promoting
In drafting a security policy and imple- domains and seeks to address security user training and awareness regard-
menting appropriate security controls, compliance at all levels: managerial, orga- ing risks and threats to information.
organizations comply with legal require- nizational, legal, operational, and techni- 5. Physical and Environmental Seairity

July/August 2005 . The I n f o r m a t i o n M o n a g e m e n t J o u r n a l 6 1


SettingStandards

- Prevent unauthorized access to driven from the top down, such that the ISO/IEC 17799 compliant and BS 7799
information processing facilities and impact is felt from the management or certified.
prevent damage to information and organizational level all the way to the Development, implementation, mainte-
to the organization's premises. operational level. nance, and continual improvement of a
6. Communications and Operations documented ISMS are fundamental to
Management - Reduce the risk of Implementation Considerations certification. To guide organizations
failure and its consequences by ISO/IEC 17799 is highly flexible and through this process, BS 7799 uses the
ensuring the proper and secure use can be used by a variety of organizations. Plan-Do-Check-Act (PDCA) model that
of information processing facilities Organizations should determine what is common to other management sys-
and by developing incident response their primary security objectives are and tems. Table 2 provides an overview of
procedures. adapt their use of the standard to these PDCA cycle phases as they relate to an
objectives as they strive for information ISMS.
7. Access Control - Control access to security governance. Table 1 provides an
information to ensure the protec- Once an organization has developed,
overview of ISO/IEC 17799 uses.
tion of networked systems and the implemented, and documented its
Organizations also must consider how ISMS, an accredited certification body
detection of unauthorized activities. to efficiently manage ISO/IEC 17799 stan- carries out a third-party audit. The BS
8. Systems Development and Main- dard implementation, given that this stan- 7799 audit includes both a documenta-
tenance - Prevent the loss, modifi- dard, although flexible, is quite complex
tion audit and an implementation
cation, or misuse of information in and touches on a number of different
audit. Security auditors assess whether
operating systems and application security areas. The important documenta-
an organization's ISMS scope covers all
software. tion and accountability requirements of
aspects of operations. They also ensure
BS 7799 certification only add to this chal-
9. Business Continuity Management that the risk assessment reflects the
lenge. One solution is to use a governing
- Develop the organization's capaci- organization's business activities and
tool that will guide the deployment team,
ty to react rapidly to the interrup- that the assessment's results are reflect-
enable collaboration across the organiza-
tion of critical activities resulting ed in the risk treatment plan. Finally,
tion, and automate the documentation
from failures, incidents, natural dis- the implementation audit verifies that
process. A number of such solutions are
asters, or catastrophes. the organization has effectively imple-
currenfly available on the market and offer
10. Compliance - Ensure that all laws mented its security policies and con-
varying levels of functionality.
and regulations are respected and trols and that processes have been set in
that existing policies comply with place to ensure the ISMS's review and
Certification Process improvement.
the security policy in order to
Organizations that base information A number of critical factors can affect
ensure that the objectives laid out by
security management systems (ISMS) success or failure in the certification
senior management are met.
on BS 7799 specifications can apply to process. Key success factors include adopt-
Figure 1 suggests a structure for the become certified. An organization that ing an implementation approach that is
standard's 10 domains. This structure is obtains certification is said to be consistent with the organization's culture.

Type of Company Size Primary Objective Use of the Standard

Small Enterprise or Fewer than Raise the awareness of the ISO 17799 contains the security
Organization 200 employees management regarding topics that should be dealt with
information security as a foundation for information
security management.

Medium Enterprise Fev^/er than Create a corporate culture The standard contains the practices
(centralized or 2,000 employees of compliance required to put together an
decentralized) information security policy.

Large Enterprise More than Obtain security certification at Use BS 7799-2 to implement, maintain
2,000 employees the end of the process review, and improve an information
security management system (ISMS)

Table 1: Uses of the ISO/IEC 17799 Standard

62 The Information Monagement Jaurnal . July/August 2 0 0 5


SettingStandards

partners, shareholders, and clients with


PDCA Phase Description
greater confidence.
Plan (establish the ISMS) • Define the ISMS scope and the organization's Furthermore, given the reduced level of
security policies risk to which ISO/IEC 17799 compliant
• Identify and assess risks organizations are exposed, these organiza-
tions will spend less money recovering
• Select control objectives and controls that will
help manage these risks
from security incidents, which may also
translate into lower insurance premiums.
• Prepare the Statement of Applicability (SoA)
Finally, an indication of the importance of
documenting the controls selected and justifying
ISO/IEC 17799 compliance is the fact that
any decisions not to implement, or to only partially
implement, certain controls
international invitations to tender are
beginning to require that organizations be
Do (implement and • Formulate and implement a risk mitigation plan ISO/IEC 17799 compliant.
operate the ISMS)
• Implement the previously selected controls to
meet the control objectives Security G)mpliance Trends
The approach to compliance is evolving
Check (monitor and • Conduct periodic reviews to verify the from one focused on technical elements to
review the ISMS) effectiveness of the ISMS an understanding of compliance as a
• Review the levels of acceptable and residual risk coherent business process (not a project)
• Periodically conduct internal ISMS audits that intimately involves all aspects of an
organization. This new perspective, where
Act (maintain and • Implement identified ISMS improvements compliance is managed and measured as a
improve the ISMS) business process, is leading some larger
•Take appropriate corrective and preventative action
• Maintain communication with all stakeholders organizations to appoint a chief security
officer or a chief risk officer to ensure that
• Validate improvements
security compliance is dealt with on a
organization-wide and ongoing basis.
Table 2: Information Security Management Systems and the PDCA Model Al Passori of META Group, in his article
"CIO Primer for Three Standard
ensuring that the security policy reflects important that organizations use a gov- Deviations," predicts that by 2009/10, 35
business objectives, and providing proper erning system to automate the BS 7799 percent of the Global 2000, i.e., the 2,000
training for employees. Another key suc- compliance and certification process, largest companies worldwide, will have
cess factor is the use of a governing system given the documentation and accountabil- adopted at least one international security
that ensures the timely update of security ity requirements. fi-amework.
policies as well as organization-wide col- The increasing interest in security
laboration and knowledge-sharing. Benefits of Implementing the frameworks is due to new governance leg-
However, the single most important suc- ISO/IEC 17799/BS 7799 Framework islation, to a growing awareness of the
cess factor in obtaining BS 7799 certifica- ISO/IEC 17799 compliance and BS 7799 importance of information security, and
tion is management commitment to, and certification provide important advan- to security audit demands by financial
support of, an ongoing, organization-wide tages on many levels. BS 7799 certification institutions and insurance companies.
information security management serves as a public statement of an organi- Initially implemented primarily in
process. Indeed, without management zation's ability to manage information Europe and Asia, ISO/IEC 17799 has been
commitment, certification cannot suc- security. It demonstrates to partners and adopted as a national standard in many
ceed. Other obstacles to obtaining certifi- clients that the organization has imple- countries, including Australia, Brazil, the
cation include insufficient knowledge of mented adequate information security Czech Republic, Finland, Iceland, Ireland,
the approach adopted and poor under- and business continuity controls. It also Japan, the Netherlands, New Zealand,
standing of security requirements, risk demonstrates the organization's commit- Norway, Spain, and Sweden.
assessment, and risk management ment to ensuring that its information Continually striving towardfiallermatu-
processes. security management system and security rity, ISO/IEC 17799 is already one of the
Once certification is achieved, organiza- policies continue to evolve and adapt to most widely referenced information secu-
tions can expect to undergo periodic changing risk exposures. Certification is a rity frameworks. As the editor of
monitoring audits and must reapply mark of distinction that sets organizations Information Security Magazine, Lawrence
for certification every three years. It is apartfi'omtheir competition and provides Walsh, notes, "Even as the ISO undertakes

64 The Information Management Journal . July/August 2 0 0 5


Best Practices and Description/Scope Offers Comparison with
Compliance Frameworks Certification? ISO/IEC 17799

CERT Security Practices A set of recommended best practices No ISO/IEC 17799 addresses a more
for improving the security of computer comprehensive set of information
network systems security issues.
Common Criteria for A technical standard that certifies the Yes ISO/IEC 17799 focuses on the
Information Technology levels of defense conferred by the organizational and administrative
Security Evaluation security measures implemented in aspects of security whereas ISO
(ISO 15408) information systems 15408 focuses on the technical
aspects of information systems.
Therefore, they are complementary.

Control Objectives for COBIT is an international standard for IT No COBIT and ISO/IEC 17799 are
Information and (Related) governance that seeks to bring together mutually complementary, with
Technology (COBIT) business control models and IT COBIT providing a broader coverage
control models. of IT governance in general and
ISO/IEC 17799 focusing more
specifically on security and
providing certification.

Guidelines for the GMIS is an international standard that No The two standards are complementary.
Management of IT Security lays out guidelines for information While GMITS describes high level
(GMITS) (ISO 13335) security management and consists of a concepts for IT security management,
number of technical reports covering ISO/IEC 17799 specifies controls that
information security management can be used to develop and
concepts and models, techniques, implement an information security
IT security management and planning, management system (ISMS).
and selection of safeguards.

Information Technology A supplement to Committee of No ITIL and ISO/IEC 17799 are


Infrastructure Library (ITIL) Sponsoring Organizations of the complementary and can be used
Treadway Commission (COSO) and together. ITIL can be used to improve
COBIT that proposes best practices general IT processes and controls and
for IT service management ISO/IEC 17799 can be used to improve
security controls and processes.

Operationally Critical An assessment and planning framework No OCTAVE is an evaluation activity, not a
Threat, Asset, and for security that enables companies to continuous process. BS 7799, on the
Vulnerability Evaluation identify and analyze risks and develop other hand, implements a continuous
(OaAVE) a plan to mitigate those risks.The process for risk management and
OCTAVE approach can be implemented compliance based on the PDCA
using two assessment methods: one for model. As such, an OCTAVE method
large companies (OCTAVE Method) and could be created and incorporated
one for small businesses (OCTAVE-S). into the planning segment of the
PDCA cycle used in BS 7799.

System Security A model for assessing the security No BS 7799 provides a process for the
Engineering Capability maturity level of an organization. Five continuous improvement of infor-
Maturity Model (SSE-CMM) security levels exist, from 1 (performed mation security. As such, SSE-CMM
informally) to 5 (continuously improving). and BS 7799 complement each
SSE-CMM does not describe a way of other and BS 7799-certified organiza-
doing things but rather reports tions may seek to be recognized as
widespread practice. SSE-CMM Level 5 organizations.

Table 3: Quick Comparison of Security Best Practices

July/August 2005 . The I n f o r m a t i o n M a n a g e m e n t J o u r n a l 6 5


SettingStandards

a major review of the standard, ISO 17799 security certification to increase confidence provides a set of best practices and con-
- and its British Standards Institution in the security of information held by com- trols that address the essential issues of
(BSI) cousin — are rapidly becoming the panies and institutions. information confidentiality, availability,
canon for information security manage- A comprehensive,flexibleframework for and integrity existing at the heart of regu-
ment." Michael Rasmussen, of the Giga implementing cost-effective compliance, latory efforts. This comprehensive
Information Group, adds that "ISO 17799 deployed via a governing system that approach to information security man-
has become the de facto standard for maintains security policies and controls, is agement enables organizations to build
defining (at a high level) an information essential for organizations falling into sev- client and partner trust in their capacity to
security program/architecture." eral regulatory realms. The ISO/IEC secure their information assets and ensure
A revised version of BS 7799 was 17799/BS 7799 best practice fi-amework business continuity. PJ
expected to be published at the end of
June 2005. Originally, the name of this
Saint-Germain is the president of Callio Technologies fwww.callio.comj, the
revised standard was going to be ISO
software provider of a process framework for deploying and maintaining security com-
24743. However, during the early part of
pliance certification. He is an expert in risk assessment and contingency planning, with
2005 it was determined that it would be
broad experience with Fortune 500 companies and government agencies at all levels.
caUed BS ISO/IEC 17799 (BS 7799-1).
Mr. Saint-Germain is a frequent speaker at security-related conferences. Contact him at
The revised standard was designed to be
rstg@callio.com.
more user-friendly and incorporates
changes in technology, technical up-
grades, and compatibility issues. The stan- References
dard also provides additional controls as
Alberts, Christopher et. al., "Introduction to the OCTAVE Approach." CERT Coordination
well as enhancing and revising existing
Center. Available at www.cert.org/octave/approach_intro.pdf (Accessed 3 June 2005).
controls. With the release of this new ver-
sion, an increase in the adoption of this
BSI. "Information and Communication Technology: Frequently Asked Questions."
standard worldwide, especially in North
Available at www.bsi-global.com/ICT/Security/faqs.xalter (Accessed 3 June 2005).
America, can be expected. (See Figure 2.)
In the current context of increased infor- BSI. Information security management systemsr-specification with guidance for use. 2002.
mation security, privacy, and governance
regulations, organizations are required to Computer Security Institute. "2004 CSI/FBI Computer Crime and Security Survey."
assess their risks, adopt appropriate con- Available at www.gocsi.com (Accessed 3 June 2005).
trols, and document their efforts to
demonstrate compliance. Lack of security Information Systems Audit and Control Association (ISACA). "COBIT Mapping: Mapping
compliance can result in business loss, as ISO/IEC 17799: 2000 With COBIT," Available at www.isaca.org/Template.cfm?Section=
well as severe civil and criminal penalties, Research2&Template=/ContentManagement/ContentDisplay.cfm&ContentID=15056#cobiti
including fines and prison sentences. so (Accessed 3 June 2005),
Moreover, a growing demand also exists for
ISO/IEC. ISO/IEC 17799: Information Technology-Code of Practice for Information
Security Management. 2000.

META Group, "Unraveling Security and Risk Regulation," white paper. January 2005.

National Institute of Standards and Technology (NIST). "International Standard ISO/IEC


17799:2000 Code of Practice for Information Security Management - Frequently Asked
Questions," November 2002, Available at csrc.nist.gov/publications/secpubs/otherpubs/reviso-
faq.pdf (Accessed 3 June 2005),

Passori, Al. META Group. "CIO Primer for Three Standard Deviations," 6 January 2005.
Available at www.metagroup.com/us/resCenter/displayResourceCenter.do?areaPrefix=ITLVM
(Accessed 3 June 2005).
Source: International ISMS/BS 7799 Certification Newsletters
July 2003, April 2004, August 2004 lAcknowledgemenC to Xlsecl
Certificate Registrar wwwjdsK.com
Rasmussen, Michael. Giga Information Group, Inc. "IT Trends 2003: Information Security
Figure 2:Trends in the Global Standards, Regulations and Legislation," 5 December 2002. Available at
Uptake of BS 7799 images.telos.com/files/external/Ciga_IT_Trends_2003.pdf (Accessed 3 June 2005).

66 The Information Management Journoi . July/August 2 0 0 5

You might also like