o-ism3 executive summary

17
O-ISM3 Open - Information Security Management Maturity Model

Upload: vicente-aceituno

Post on 26-Jan-2015

1.853 views

Category:

Technology


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: O-ISM3 Executive Summary

O-ISM3

Open - Information Security Management Maturity Model

Page 2: O-ISM3 Executive Summary

O-ISM3 is an Information Security Management Method

Page 3: O-ISM3 Executive Summary

A method is the complete definition of how to make repeatable a complex activity

Page 4: O-ISM3 Executive Summary

O-ISM3 is a Standard

Page 5: O-ISM3 Executive Summary

+

+

+

O-ISM3 is Compatible

Page 6: O-ISM3 Executive Summary

O-ISM3 is not about Compliance

Page 7: O-ISM3 Executive Summary

O-ISM3 is about Results

Page 8: O-ISM3 Executive Summary

Security Investment, Maturity Level & Risk

Security Investment

Risk

Risk Reduction/Additional SecurityInvestment

O-ISM3 has Maturity Levels…

Page 9: O-ISM3 Executive Summary

Security Investment, Maturity Level & Risk

Security Investment

Risk

Risk Reduction/Additional SecurityInvestment

… in order to cater for different requirements and resources

Page 10: O-ISM3 Executive Summary

O-ISM3 Metrics are built-in

Activity. Scope. Efficacy. Efficiency.

Page 11: O-ISM3 Executive Summary

Risk Assessment is not compulsory

InternalNetwork

DMZMobileUsers

InternalUsers

WiFiNetworks

Govern

ance

Infrastructure

Hum

an

Resources

Prod

uction

Logistics

Adm

inistrationIT

Advertising

Research

Procurem

ent

Sale

s

Busine

ssIntelligence

Financing /

Accounting

Maintenance

Relationships

Legal

Page 12: O-ISM3 Executive Summary

O-ISM3 helps tuning: How much security is enough?

Page 13: O-ISM3 Executive Summary

Use case – Malware Management

Use case – ISM3-less management Motivation: Clean viruses or your business will sink. Objective: No system should get a virus ever Activity: Install antivirus on personal computers, servers, mail

servers, add antivirus functionality to firewalls, add antispyware, antitrojan, antirookit to the mix.

Policy: Prevent any USB, DVD, to touch any company system without being searched for viruses.

Success criterion: When no system gets ever a virus. Continuous improvement: Add more antimalware controls

(Tripwire, CORE, etc)

Page 14: O-ISM3 Executive Summary

Use Case – ISM3-style management Motivation: Unfortunately systems, specially Windows and malware prone.

We should invest proportionally to the damage they can make. Goal: Systems should accomplish their business role with or without

malware. Activity: Install antimalware in vulnerable systems. Measure activity, scope,

update and availability of antimalware. Consider other measures, like using less malware prone systems.

Policy: Use in every system the antimalware protection that will detect malware and prevent the system from failing to play its business role.

Success criterion: When protected system play their business role without interruption or degradation.

Continuous improvement: Use metrics to improve the antimalware protection and use those with better effectively and ROI.

Use case – Malware Management

Page 15: O-ISM3 Executive Summary

ISMS Method Standard published by The Open Group Compatible with ISO2700x, CobIT, ITIL, etc. Focus on results, not on compliance. Maturity Levels adapt to different resources

and requirements. Uses Processes instead of Controls. Metrics are included, they don't need to be

developed anew. Risk Assessment is optional. Security objectives and targets help

handling: How much security is enough?

Summary

Page 16: O-ISM3 Executive Summary

Learn to implement High Performance Security Management Processes

http://cli.gs/ism3

Web www.inovement.esVideo Blog youtube.com/user/vaceitunoBlog ism3.comTwitter twitter.com/vaceitunoPresentationsslideshare.net/vaceituno/presentations

Articles slideshare.net/vaceituno/documents

Page 17: O-ISM3 Executive Summary