Sei sulla pagina 1di 6

Computers & Security (2004) 23, 371e376

www.elsevier.com/locate/cose

The 10 deadly sins of information security


management
Basie von Solmsa,), Rossouw von Solmsb

a
RAU-Standard Bank Academy for Information Technology, Rand Afrikaans University,
Johannesburg, South Africa
b
Faculty for Computer Studies, PE Technikon, Port Elizabeth, South Africa

Received 1 April 2004; revised 4 May 2004; accepted 4 May 2004

KEYWORDS Abstract This paper identifies 10 essential aspects, which, if not taken into
Information security; account in an information security governance plan, will surely cause the plan to
Information security fail, or at least, cause serious flaws in the plan. These 10 aspects can be used as
management; a checklist by management to ensure that a comprehensive plan has been defined
Information security and introduced.
governance; ª 2004 Elsevier Ltd. All rights reserved.
Information security
policy;
Information security
risk analysis;
Information security
compliance

Introduction All 10 of these aspects are essential to take into


account when implementing such an information
This paper is based on years of experience in security plan in a company, or to be evaluated
teaching information security to a wide audience, when an existing information security plan seems
as well as on information security consultancy to be having problems in being really effective.
projects in many companies. The paper identifies From experience, if even one of these aspects
the 10 most important aspectsdcalled the ‘deadly is ignored, or not properly taken into account,
sins of information security’dwhich result in com- serious problems in introducing and maintaining
panies experiencing severe problems in imple- a proper information security plan in a company
menting a successful comprehensive information will surely arise.
security plan within the company. The paper will briefly discuss each of these
aspects or sins, providing some motivation on
) Corresponding author. Tel.: D27-41-504-3604; fax: why their absence from any plan will cause infor-
D27-41-504-9604.
mation security related problems.
E-mail addresses: basie@rau.ac.za (B. von Solms), rossouw@ The paper ends with a ‘tick list’, which informa-
petech.ac.za (R. von Solms). tion security managers can use to evaluate the

0167-4048/$ - see front matter ª 2004 Elsevier Ltd. All rights reserved.
doi:10.1016/j.cose.2004.05.002
372 B. von Solms, R. von Solms

presence/absence of these aspects from their Other papers emphasizing this integration of in-
information security plan. formation security with corporate governance have
also appeared, for example (von Solms, 2001).
These documents have been supported by
a growing set of laws and legal requirements which
The 10 deadly sins of information have appeared internationally, specifically related
security to the privacy of customer, client and patient
data. Some examples of such laws and legal re-
These sins are introduced below, and discussed quirements are the ECT Act in SA (ECT) and the
individually in the subsequent paragraphs. HIPAA Act (HIPAA) in the USA.
The implication of these developments are that
1. Not realizing that information security is
the Board of Directors as well as top management,
a corporate governance responsibility (the
have a direct corporate governance responsibility
buck stops right at the top)
towards ensuring that all the information assets
2. Not realizing that information security is a
of the company are secure, and that due care
business issue and not a technical issue
and due diligence have been taken to maintain
3. Not realizing the fact that information security
such security. Compromised company informa-
governance is a multi-dimensional discipline
tion assets can have serious financial and legal
(information security governance is a complex
implications for a company, and executive man-
issue, and there is no silver bullet or single ‘off
agement can be held personally liable in some
the shelf’ solution)
cases.
4. Not realizing that an information security plan
Further, it is responsibility of executive man-
must be based on identified risks
agement to extensively report on the protection
5. Not realizing (and leveraging) the important
of information assets to the Board of the company.
role of international best practices for infor-
Consequences of committing this sin: executive
mation security management
management are not performing and exercising
6. Not realizing that a corporate information
the due care and due diligence expected by
security policy is absolutely essential
them, and may open themselves up to serious
7. Not realizing that information security compli-
personal and corporate liabilities.
ance enforcement and monitoring is absolutely
essential
8. Not realizing that a proper information security Sin number 2: not realizing that the
governance structure (organization) is abso- protection of information is a business
lutely essential issue and not a technical issue
9. Not realizing the core importance of informa-
tion security awareness amongst users
This sin is closely related to the one discussed
10. Not empowering information security man-
above, but is highlighted on its own, because it
agers with the infrastructure, tools and sup-
does provide another dimension to the problem.
porting mechanisms to properly perform their
Information security related problems in a
responsibilities
company cannot be solved by technical means
alone. The sooner the management of a company
grasps this fact, the sooner they will apply due
Sin number 1: not realizing that care.
information security is a corporate Unfortunately, in many cases, executive man-
governance responsibility (the buck agement in companies still think that technology
stops right at the top, and there is all that is required, and therefore ‘delegates
are legal consequences) or downgrades’ the issue to the technical depart-
ments, and conveniently forgets about it.
The realization that information security gover- Without the proper, direct and continuous
nance is an essential and integral part of corporate support of such executive management, as well
governance has grown specifically in the last few as acting as examples of information security
years. The driving force has been several docu- consciousness and awareness, the information
ments on corporate governance which have ap- security problem will not receive due care or be
peared recently, for e.g. the King II Report in addressed satisfactorily.
South Africa (King) and ISACA’s Control Objectives Consequences of committing this sin: tech-
for Information and Related Technologies (COBIT). nology will be thrown at the information security
10 deadly sins of ISM 373

problem, without resulting in a total, comprehen- dimensions will continuously need to be added to
sive solution. This might also result in money wasted. the solution.

Sin number 4: not realizing that an


Sin number 3: not realizing the fact
information security plan must be
that information security governance
based on identified risks
is a multi-dimensional discipline
The purpose of information security is to provide
This sin is again closely related to the one dis-
measures to mitigate the risks associated with
cussed above, but again is significant enough to
the company’s information resources. However,
be mentioned on its own.
if the company is not very clear on precisely what
Information security is a multi-dimensional dis-
the potential threats are as well as what assets
cipline, and all dimensions must be taken into ac-
they are protecting, they may basically be shoot-
count to ensure a proper and secure environment
ing in the dark, and spending money protecting
for a company’s information assets.
themselves against threats which have a very low
The following dimensions of information secu-
probability of occurring, and ignoring others which
rity are clearly identifiabledsome direct from
have a very large impact once they occur.
published literature, and others indirectly from
It is therefore essential that a company must
speaking to information security managers. The
base its information security plan on some type
list of dimensions below is not necessarily com-
of risk analysis exercise. This can be a very formal,
plete, because the dynamic nature of information
structured and comprehensive exercise, or a more
security prevents any such delineation. Some of
high-level oriented approach in combination with
the dimensions may overlap in terms of its con-
international best practices. The authors, based
tent. However, the number of and precise content
on experience, prefer the last approach.
of dimensions are not the most important
However, whatever approach is taken, it must
factordthe fact that there are different dimen-
be possible to motivate all actions taken, and all
sions, and that they must collectively contribute
countermeasures suggested, in terms of some form
towards a secure environment, is important.
of risk analysis for that specific company.
The following dimensions can be identified
Consequences of committing this sin: the com-
without much difficulty:
pany may be spending money on risks which may
* The Corporate Governance Dimension not really be that dangerous, and ignoring others
* The Organizational Dimension which may be extremely serious.
* The Policy Dimension
* The Best Practice Dimension Sin number 5: not realizing
* The Ethical Dimension (and leveraging) the important
* The Certification Dimension role of international best practices
* The Legal dimension
for information security governance
* The Insurance Dimension
* The Personnel/Human Dimension
The typical questions the information security
* The Awareness Dimension
manager (ISM) needs and wants answers to,
* The Technical Dimension
include:
* The Measurement/Metrics (Compliance moni-
toring/Real time IT audit) Dimension  Against which risks must the information
* The Audit Dimension resources be protected?
 What set of countermeasures will provide the
From this list, it is clear that most of these di-
best protection against these risks?
mensions are of a non-technical nature, which
links to the previous discussed sin. These questions are very important, and must
All these dimensions must be taken into account receive answers, otherwise the company may
in designing and creating a comprehensive infor- waste money on unnecessary or inefficient coun-
mation security plan for a company, because no termeasures.
single dimension, or product or tool on its own will Following international best practices for infor-
provide a proper all inclusive solution. mation security governance is based on the con-
Consequences in committing this sin: a ‘lop cept of ‘learning from the successful information
sided’ information security solution will be imple- security experiences of others’. The idea is that
mented, which will results in frustration as further a large percentage of information security threats,
374 B. von Solms, R. von Solms

resulting risks, and selected countermeasures are top management of companies know that they
the same for all companies. If a large number of are proving their due care and due diligence by
companies have documented their experiences in following the advice of experts.
this area, alongside the countermeasures they Examples of leading best practices in the area of
have selected for the possible risks, why do a com- information security are ISO17799 and ISF.
prehensive risk analysis to probably arrive at the Consequences of committing this sin: unneces-
same result?drather use these documented expe- sary time and money is wasted to arrive at a solu-
riences directly. tion which had, most probably, already been
documented.
 Why redo what others have done already?
 Why re-invent the wheel for well-established
environments? Sin number 6: not realizing that
 Learn from and apply their experience! a corporate information security
 The ’bread and butter’ aspects of information policy is absolutely essential
security are the same in most IT environments.
This is precisely what ‘following a best practice’ All international best practices for information se-
means. curity management stress the fact that a proper
An international best practice (Code of Practice corporate information security policy is the heart
for Information) for information security manage- and basis of any successful information security
ment normally documents the knowledge of management plan.
a group of people (companies) as far as their expe- Such a policy is the starting point and reference
rience with information security management is framework on which all other information security
concerned. It therefore reflects the practices and sub-policies, procedures and standards must be
experiences followed by the relevant people in based.
managing information security. Such a policy must be short (3e4 pages), and
The challenge to any information security man- signed by the CEO, showing executive manage-
ager is therefore to do the right things right. The ment’s commitment and buy-in towards all infor-
question asked by many such managers is: ‘How mation security aspects. This is the most visible
do I know what the right things are?’ way in which executive management shows their
If it can be determined what the rights things commitment towards information security in the
are, how do you know you are doing it right. company.
Information security is not a new aspect of IT. Consequences of committing this sin: all in-
Many people and many companies have struggled formation security projects and efforts in the
with information security over many years. In this company will have no anchoring point and
process, they have found out what are the right proof of high-level commitment, and will be floun-
things, and how to do them right. dering around without really making progress.
They have therefore determined from experi-
ence what best practices are required and how
to implement them effectively. Sin number 7: not realizing that
This experience had been documented in a wide information security compliance
set of documents, basically referred to as Stand- enforcement and monitoring
ards and Guidelines. These documents are avail- is absolutely essential
able to new information security managers, and
should be used. It is no use having a perfect corporate informa-
They can be seen as the consensus of experts in tion security policy, with a comprehensive set
the field of information security, and generally of supporting sub-policies, conforming to inter-
provide an internationally accepted framework national best practices, if it is not possible
on which to base information security governance to monitor and enforce compliance to such
and management. policies.
Nobody needs to re-invent the ‘information se- ‘Un-enforced policies breed contempt’ is a
curity wheel’. This wheel has been developed, it slogan which should be heeded.
is documented and should be used as such. Any information security manager should be
This does not necessarily mean that if these empowered through technical and non-technical
best practices are followed strictly that no security measurement tools to be able to monitor compli-
incidents will occur. That is of course not true, but ance to relevant information security policies,
at least an information security manager, and the and act if any discrepancies appear.
10 deadly sins of ISM 375

Such monitoring and measurement tools must be spelled out clearly, and cemented into proper
also not be built and dependent on annual or bi- organizational structures.
annual internal audit reportsdnobody can any-
more afford to find out after 6 months that a fired
employee still has access rights to the system. Sin number 9: not realizing the core
Such tools must be real time and provide real time importance of information security
monitoring and reporting. awareness amongst users
‘You can only manage that which you can
measure’ is directly related to this sin.
Although this sin is so apparent it needs no discus-
Consequences of committing this sin: a false
sion, it is still committed by many companies.
sense of security may exist and be cultivated be-
No proper awareness programs exist, and users
cause ‘we have all the necessary policies in place’,
are unaware of the risks of using the company’s
without realizing that these policies may not be
IT infrastructure, and the potential damage they
complied with.
can cause.
Furthermore they are often not even aware of
the information security policies, procedures and
Sin number 8: not realizing that a proper standards existing in the company.
Users cannot be held responsible for security
information security governance structure
problems if they are not told what such security
(organization) is absolutely essential
problems are, and what they should do to prevent
them.
It is essential that a company must have a proper
In many cases it is realized that money spent on
information security organizational structure to comprehensive user information security aware-
make an information security governance plan ness programs is some of the best money spent
successful. on information security.
Such a structure has to do with the way in which Consequences of committing this sin: many in-
information security is organized and structured in formation security related intensions will fail to
a company. The importance of such structures is
materialize if users are not properly educated in
stressed by several codes of best practice for infor-
this regard.
mation security management, which all states that
the existence of a proper organizational structure,
including some type of Information Security
Forum, is essential for successful information secu-
Sin number 10: not empowering
rity implementations. This dimension not only information security managers with
refers to the organizational structure itself, but the infrastructure, tools and supporting
also to aspects like information security related mechanisms to properly perform
job responsibilities, communication between in- their responsibilities
formation security related roles and the involve-
ment of top management with information This sin is closely related to sin numbers 7 and 8
security. It also includes clarity on what aspects above, but is so important that it warrants it be
of information security management are to be cen- listed separately.
tralized, what aspects are to be decentralized as Very often, executive management appoints an
well as where the compliance monitoring and information security manager, and expects such
enforcement capability will reside (should never a person to do everything alone.
be part of the IT Department itself). This is not possible, because of the complexity
Consequences of committing this sin: every- and multi-dimensionality of information security.
thing related to and involving information security Understanding and deliberately trying to prevent
is automatically referred to the (single) informa- the sins discussed above, will go a long way in pre-
tion security manager, who really is not the owner venting this one.
of any information, just the custodian. Consequences of committing this sin: informa-
If information owners are not clearly defined, tion security managers realize soon that they can-
and held responsible for the security of the infor- not do their job properly, and either move on, or
mation under their control, severe risks do arise. move out of information security. This opens the
Accountability for information security must be company up to severe risks because no continuity
shared by all employees, and not only the informa- exists as well as the fact that the security plan
tion security manager. This accountability must never gets fully implemented.
376 B. von Solms, R. von Solms

Conclusion If the answer to any of the above is ‘no’, serious


attention must be given to revisit and re-evaluate
Creating and implementing a proper information se- that aspect, as well as the complete information
curity program is not necessarily rocket scienced security governance plan.
most of the important components that should be
part of such a program are basically common References
sense. However, very often these common sense
issues are ignored because there is a lack of under- COBIT. Available from: www.isaca.org.
standing and realizing how essential they are. ECT. Available from: www.doc.gov.za.
This paper attempted to put all these essential HIPAA. Available from: www.hhs.gov/ocr/hipaa.
components into place. ISO17799. Available from: www.iso.ch.
ISF. Available from: www.isfsecuritystandard.com.
The following ‘tick list’ can be used to evaluate King. Available from: www.iodsa.co.za.
your company’s information security plan in terms von Solms SH. Corporate governance and information security.
of the 10 deadly sins discussed above. Comput Secur 2001;20:215e8.
Our company’s information security plan fully
takes into account that: Prof SH (Basie) von Solms holds a PhD in Computer Science, and
has been Chairman of the Rand Afrikaans University-Standard
Bank Academy for Information Technology at the Rand Afrikaans
Information security is a corporate Yes No University in Johannesburg, South Africa, since 1978. Prof von
governance responsibility (the buck Solms is the present Vice-President of IFIP, the International
stops right at the top) Federation for Information Processing, and the immediate
Information is a business and not Yes No past Chairman of Technical Committee 11 (Information Securi-
a technical problem ty), of the IFIP. He is also a member of the General Assembly
of IFIP. Prof von Solms has been a consultant to industry on
Information security governance is a Yes No
the subject of Information Security for the last 10 years. He is
multi-dimensional discipline a member of the British Computer Society, a Fellow of the Com-
(information security governance puter Society of South Africa, and a SAATCA Certified Auditor
is a complex issue, and there is for ISO 17799, the international Code of Practice for Informa-
no silver bullet or single ‘off the tion Security Management.
shelf’ solution)
Information security plan must be Yes No Professor Rossouw von Solms is the Head of Department of In-
based on proper risk analysis formation Technology at Port Elizabeth Technikon, in South
International best practices for Yes No Africa. He holds a PhD from the Rand Afrikaans University. He
information security governance has been a member of the International Federation for Informa-
tion Processing (IFIP) TC 11 committee since 1995. He is a founder
drives our plan
member of the Technikon Computer Lecturer’s Association
A corporate information security Yes No (TECLA) and is an executive member ever since. He is also
policy is absolutely essential a Vice-President of the South African Institute for Computer Sci-
Information security compliance Yes No ence and Information Technology (SAICSIT). He has published
enforcement and monitoring many papers in international journals and presented numerous
is absolutely essential papers at national and international conferences in the field of
A proper information security Yes No Information Security Management.
governance structure (organization)
is absolutely essential
Information security awareness amongst Yes No
users is core to the success of our plan
Our information security manager Yes No
is empowered with the infrastructure,
tools and supporting
mechanisms to properly perform
his/her responsibilities

Potrebbero piacerti anche