32

Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Embed Size (px)

Citation preview

Page 1: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes
Page 2: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Agenda

COBIT 5 Product FamilyInformation SecurityCOBIT 5 content

Chapter 2. Enabler: Principles, Policies and Frameworks.Chapter 3. Enabler: ProcessesChapter 4. Enabler: Organisational StructuresChapter 5. Enabler: Culture, Ethics and BehaviourChapter 6. Enabler: InformationChapter 7. Enabler: Services, Infrastructure and ApplicationsChapter 8. Enabler: People, Skills and Competencies

AppendicesAppendix A. Detailed Guidance: Principles, Policies and Frameworks EnablerAppendix B. Detailed Guidance: Processes EnablerAppendix C. Detailed Guidance: Organisational Structures EnablerAppendix D. Detailed Guidance: Culture, Ethics and Behaviour EnablerAppendix E. Detailed Guidance: Information EnablerAppendix F. Detailed Guidance: Services, Infrastructure and Applications EnablerAppendix G. Detailed Guidance: People, Skills and Competencies EnablerAppendix H. Detailed Mappings

Page 3: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Product Family

Page 4: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

COBIT 5 Principles

Page 5: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Information Security

ISACA defines information security as something that:Ensures that within the enterprise, information is protected against disclosure to unauthorised users (confidentiality), improper modification (integrity) and non-access when required (availability).

Confidentiality means preserving authorised restrictions on access and disclosure, including means for protecting privacy and proprietary information.Integrity means guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. Availability means ensuring timely and reliable access to and use of information.

Page 6: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Capability

Page 7: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

COBIT 5 Enablers

Page 8: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Enabler: Principles, Policies and Framework

2.1 Principles, Policies and Framework Model2.2 Information Security Principles2.3 Information Security Policies2.4 Adapting Policies to the Enterprise’s Environment2.5 Policy Life Cycle

Page 9: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Enabler: Principles, Policies and Framework

Page 10: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Appendix A

Page 11: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Appendix A

Information security policyAccess control policyPersonnel information security policyPhysical and environmental information security policyIncident management policyBusiness continuity and disaster recovery policyAsset management policyRules of behaviour (acceptable use)Information systems acquisition, software development and maintenance policyVendor management policy Communications and operation management policyCompliance policyRisk management policy

Page 12: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Enabler: Process

3.1 The Process Model3.2 Governance and Management Processes3.3 Information Security Governance and Management Processes3.4 Linking Processes to Other Enablers

Page 13: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Appendix B Process

Page 14: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Appendix B Process

Page 15: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Appendix B Process

Page 16: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Appendix B Process

Page 17: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Appendix B Process

Page 18: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Enabler: Organisational Structures

4.1 Organisational Structures Model4.2 Information Security Roles and Structures4.3 Accountability Over Information Security

Page 19: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Appendix C

Page 20: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Appendix C

Page 21: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Enabler: Culture, Ethics and Behaviour

5.1 Culture Model5.2 Culture Life Cycle5.3 Leadership and Champions5.4 Desirable Behavior

Page 22: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Appendix D

Page 23: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Enabler: Information

6.1 Information Model6.2 Information Types6.3 Information Stakeholders6.4 Information Life Cycle

Page 24: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Appendix E

Page 25: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Enabler: Services, Infrastructure and Applications

7.1 Services, Infrastructure and Applications Model.7.2 Information Security Services, Infrastructure and Applications

Page 26: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Appendix F

Provide a security architecture.Provide security awareness.Provide secure development (development in line with security standards).Provide security assessments.Provide adequately secured and configured systems, in line with security requirements and security architecture.Provide user access and access rights in line with business requirements.Provide adequate protection against malware, external attacks and intrusion attempts.Provide adequate incident response.Provide security testing.Provide monitoring and alert services for security-related events.

Page 27: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Appendix F

Page 28: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Appendix F

Page 29: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Enabler: People, Skills and Competencies

8.1 People, Skills and Competencies Model8.2 Information Security-related Skills and Competencies

Page 30: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Appendix G

Page 31: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes

Appendix H

ISO/IEC 27000 series provides a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an ISMS:• Security- and risk-related processes in the EDM, APO and DSS domains• Various security-related activities within processes in other domains• Monitoring and evaluating activities from the MEA domain

The ISF 2011 Standard of Good Practice for Information Security is based on the ISF Information Security Model four main categories: information security governance, information security requirements, control framework, and information security monitoring and improvement.

Guide for Assessing the Information Security Controls in Federal Information Systems and Organisations, NIST—The purpose of this guide is to provide direction with regard to information security controls for executive agencies of the US government

Page 32: Agenda COBIT 5 Product Family Information Security COBIT 5 content Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes