document hierarchy of information security corporate
play

Document Hierarchy of Information Security Corporate Security - PowerPoint PPT Presentation

Document Hierarchy of Information Security Corporate Security Policy Policy General commitment to Information Security General commitment to Information Security Installation of CorpSec Enabling CSO Installing Information Security Standard


  1. Document Hierarchy of Information Security Corporate Security Policy Policy General commitment to Information Security General commitment to Information Security Installation of CorpSec Enabling CSO Installing Information Security Standard Defining Assets, Objectives & Information Controls Controls Security Standard Security Standard For Information Security Detailed Implementation Detailed Implementation Technique, Processes, General Directive(s) Procedures, etc Specific Directive(s)

  2. I SMS Structure Overview • ISMS = Information Security Management System. • It consists of 3 types of documents, structured in 3 tiers. • Tier 1: Information Security Policy, general statement about information security, enabling security organisation, requires information security standard. • Tier 2: Information Security Standard, defining objectives and controls for information security, giving guidance for implementation. Consists of 15 chapters one for each main realm of information security chapters, one for each main realm of information security. • Tier 3: Information Security Directives, giving more detailed implementation guidance for certain areas.

  3. I nform ation Security Policy • High level document • Only abstract goals for information security • Defines security organisation and it’s duties • Defines the “corner pillars” • “Orders” a security standard document based on ISO 27002 • Defines security as a innate part of bwin’s business

  4. I nform ation Security Standard • Based on ISO 27002 • Adapted to the special needs of bwin • 15 chapters Introduction Scope Terms and definitions Structure of this standard Risk assessment and treatment Risk assessment and treatment Security policy Organisation of information security Asset management Human resources security Physical and environmental security Communications and operations management Access control Information systems acquisition, development and maintenance Information security incident management Business continuity management Compliance Compliance • Defining objectives and controls for information security based on international regulations and best practices • Leaving the decision to management not to implement and take the risk L i th d i i t t t t i l t d t k th i k

  5. Security Directives • Information Classification & Handling Defines templates and procedures for classification if information in the 3 dimensions, confidentiality, integrity and availability • Risk Management Defines how Risk management has to be done at bwin g • Directive on Worldwide Security Organization Internal organisation of CorpSec • Asset Management Defining assets, responsibility for assets, documentation, … • HR Directive Describing what HR has to consider when hiring personal and external resources • Physical & Environmental Directive Directive to handle premises of bwin, physical security, entry control, doors, windows, … • Access Control Directive Security directive for IT operations, defining operations management, logging, administration rules, … • System Acquisition / Development & Maintenance Directive • System Acquisition / Development & Maintenance Directive Security rules for architecture, software development and procurement of systems and software • Security Incident Management Directive How to log and report security events • Business Continuity Directive Rules to define and run required availability in IT and to handle critical services on failure q y • Audit Directive How to deal with internal and external auditors, provide correct data and evidence • Users Directiveto Information Security Rules for the users of bwin’s IT infrastructure • Privacy Protection Directive

  6. Principles for Security Directives • Derived from Information Security Standard or a more abstract Directive • Dedicated the a special task, region or audience • Only needed if Standard is not adequate or specific enough • Examples: • General HR Security Directive • General HR Security Directive • HR Security Directive for Austria/ Sveden/ … • General Security Directive for Data Centres • Security Directive for Data Centre A • Security Directive for Data Centres in USA • Security Directive for Webserver • Security Directive for IIS/ Apache/ …

  7. ToDos 1. CEOs sign and publish Corporate Security Policy 2. Workshops with Business Responsibles about their chapters (C-lvl, Head- Ofs) (Oliver Eckel) Ofs) (Oliver Eckel) 3. Release of accorded Information Security Standard by CSO 4. 4 Workshop with Business Experts about detailed Directives (MK+ CG) Workshop with Business Experts about detailed Directives (MK+ CG) 5. Gap Analysis 6 6. Budget and time estimation Budget and time estimation 7. Implementation considering priority

  8. Thank You Thank You

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend