Presentation is loading. Please wait.

Presentation is loading. Please wait.

Agenda COBIT 5 Product Family Information Security COBIT 5 content

Similar presentations

Presentation on theme: "Agenda COBIT 5 Product Family Information Security COBIT 5 content"— Presentation transcript:


2 Agenda COBIT 5 Product Family Information Security COBIT 5 content
Chapter 2. Enabler: Principles, Policies and Frameworks. Chapter 3. Enabler: Processes Chapter 4. Enabler: Organisational Structures Chapter 5. Enabler: Culture, Ethics and Behaviour Chapter 6. Enabler: Information Chapter 7. Enabler: Services, Infrastructure and Applications Chapter 8. Enabler: People, Skills and Competencies Appendices Appendix A. Detailed Guidance: Principles, Policies and Frameworks Enabler Appendix B. Detailed Guidance: Processes Enabler Appendix C. Detailed Guidance: Organisational Structures Enabler Appendix D. Detailed Guidance: Culture, Ethics and Behaviour Enabler Appendix E. Detailed Guidance: Information Enabler Appendix F. Detailed Guidance: Services, Infrastructure and Applications Enabler Appendix G. Detailed Guidance: People, Skills and Competencies Enabler Appendix H. Detailed Mappings

3 Product Family

4 COBIT 5 Principles

5 ISACA defines information security as something that:
Ensures that within the enterprise, information is protected against disclosure to unauthorised users (confidentiality), improper modification (integrity) and non-access when required (availability). Confidentiality means preserving authorised restrictions on access and disclosure, including means for protecting privacy and proprietary information. Integrity means guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. Availability means ensuring timely and reliable access to and use of information.

6 Capability

7 COBIT 5 Enablers

8 Enabler: Principles, Policies and Framework
2.1 Principles, Policies and Framework Model 2.2 Information Security Principles 2.3 Information Security Policies 2.4 Adapting Policies to the Enterprise’s Environment 2.5 Policy Life Cycle

9 Enabler: Principles, Policies and Framework
1. Support the business: • Focus on the business to ensure that information security is integrated into essential business activities. • Deliver quality and value to stakeholders to ensure that information security delivers value and meets business requirements. • Comply with relevant legal and regulatory requirements to ensure that statutory obligations are met, stakeholder expectations are managed, and civil or criminal penalties are avoided. • Provide timely and accurate information on information security performance to support business requirements and manage information risk. • Evaluate current and future information threats to analyse and assess emerging information security threats so that informed, timely action to mitigate risk can be taken. • Promote continuous improvement in information security to reduce costs, improve efficiency and effectiveness, and promote a culture of continuous improvement in information security. 2. Defend the business: • Adopt a risk-based approach to ensure that risk is treated in a consistent and effective manner. • Protect classified information to prevent disclosure to unauthorised individuals. • Concentrate on critical business applications to prioritise scarce information security resources by protecting the business applications in which a security incident would have the greatest business impact. • Develop systems securely to build quality, cost-effective systems on which business people can rely. 3. Promote responsible information security behaviour: • Act in a professional and ethical manner to ensure that information security-related activities are performed in a reliable, responsible and effective manner. • Foster an information security-positive culture to provide a positive security influence on the behaviour of end users, reduce the likelihood of security incidents occurring, and limit their potential business impact.

10 Appendix A

11 Appendix A Information security policy Access control policy
Personnel information security policy Physical and environmental information security policy Incident management policy Business continuity and disaster recovery policy Asset management policy Rules of behaviour (acceptable use) Information systems acquisition, software development and maintenance policy Vendor management policy Communications and operation management policy Compliance policy Risk management policy

12 Enabler: Process 3.1 The Process Model
3.2 Governance and Management Processes 3.3 Information Security Governance and Management Processes 3.4 Linking Processes to Other Enablers

13 Appendix B Process

14 Appendix B Process

15 Appendix B Process

16 Appendix B Process

17 Appendix B Process

18 Enabler: Organisational Structures
4.1 Organisational Structures Model 4.2 Information Security Roles and Structures 4.3 Accountability Over Information Security

19 Appendix C

20 Appendix C

21 Enabler: Culture, Ethics and Behaviour
5.1 Culture Model 5.2 Culture Life Cycle 5.3 Leadership and Champions 5.4 Desirable Behavior

22 Appendix D

23 Enabler: Information 6.1 Information Model 6.2 Information Types
6.3 Information Stakeholders 6.4 Information Life Cycle

24 Appendix E example in figure 17): – A—Approver – O—Originator
– I—Destination for information purposes – U—Destination: information consumer

25 Enabler: Services, Infrastructure and Applications
7.1 Services, Infrastructure and Applications Model. 7.2 Information Security Services, Infrastructure and Applications

26 Appendix F Provide a security architecture.
Provide security awareness. Provide secure development (development in line with security standards). Provide security assessments. Provide adequately secured and configured systems, in line with security requirements and security architecture. Provide user access and access rights in line with business requirements. Provide adequate protection against malware, external attacks and intrusion attempts. Provide adequate incident response. Provide security testing. Provide monitoring and alert services for security-related events.

27 Appendix F

28 Appendix F

29 Enabler: People, Skills and Competencies
8.1 People, Skills and Competencies Model 8.2 Information Security-related Skills and Competencies

30 Appendix G

31 Appendix H ISO/IEC series provides a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an ISMS: Security- and risk-related processes in the EDM, APO and DSS domains Various security-related activities within processes in other domains Monitoring and evaluating activities from the MEA domain The ISF 2011 Standard of Good Practice for Information Security is based on the ISF Information Security Model four main categories: information security governance, information security requirements, control framework, and information security monitoring and improvement. Guide for Assessing the Information Security Controls in Federal Information Systems and Organisations, NIST—The purpose of this guide is to provide direction with regard to information security controls for executive agencies of the US government


Download ppt "Agenda COBIT 5 Product Family Information Security COBIT 5 content"

Similar presentations

Ads by Google