Download presentation
Presentation is loading. Please wait.
Published byGordon Parrish Modified over 6 years ago
1
ISO ITAM/SAM: ISO/IEC 19770-1 Edition 3 ISO/IEC 19770-1:2017 published December 2017
2
Purpose of Presentation
To explain edition 3 of to SAM and ITAM professionals, and to other interested individuals, by providing both context and also more detail than is available from the ISO preview Context includes Why we want such a standard How it relates to other standards How it relates to Information Security in particular The deck, or parts of it, may be used by SAM and ITAM professionals to communicate this information to other interested parties © 2018 ISO/IEC All Rights Reserved
3
© 2018 ISO/IEC All Rights Reserved
Contents Process standards Management system standards IT asset management & physical asset management ISO ITAM overview ISO ITAM contents ISO ITAM process objectives & tiers Where to obtain ITAM and Information Security - Using 27001:2013 and :2017 Together Historical Supplemental Materials © 2018 ISO/IEC All Rights Reserved
4
What is a Process Standard
Specification of the processes for a specific functional area Most market-significant approach is the ISO Management System Standard ISO 9001 Quality Management ISO/IEC Information Security Management Many more © 2018 ISO/IEC All Rights Reserved
5
Why Have a Process Standard?
Facilitate common industry terminology and approaches in products and services Facilitate training and awareness Facilitate comparability of suppliers Facilitate organizational assessment against agreed baseline Allow independent certification © 2018 ISO/IEC All Rights Reserved
6
Management System Standards
Management System Standards (MSSs) are process standards written in an ISO-specified way Both (Information Security Management – ISM) and (IT Asset Management – ITAM) are Management System Standards (MSSs) using the ISO-mandated ‘high level structure and common wording’ from ‘Annex SL’ to ISO directives All MSSs (since ca 2013) also comply e.g (Quality Management) and (Environmental Management) (IT Service Management) is currently being rewritten in this way All look the same at the top level; differences are in the detail, via additions © 2018 ISO/IEC All Rights Reserved
7
Why Have an MSS ITAM Process Standard
Alignment with all MSSs Greater understanding by all people working with MSSs Specific alignment/integration with Security (ISO/IEC 27001) Service Management (ISO/IEC ) More uptake of the standard ISO requirement for our type of standard © 2018 ISO/IEC All Rights Reserved
8
© 2018 ISO/IEC All Rights Reserved
MSS Examples ISO 9001 Quality Management ISO/IEC Information Security Management ISO/IEC Software Asset Management ISO/IEC Service Management ISO Asset Management ISO Business Continuity Management ISO Environmental Management ISO Event Sustainability Management ISO Food Safety Management ISO Security Management ISO Facilities Management ISO Occupational Health & Safety Management ISO Energy Management … and more © 2018 ISO/IEC All Rights Reserved
9
MSS High Level Structure (1)
Introduction 1. Scope 2. Normative references 3. Terms and definitions 4. Context of the organization 4.1 Understanding the organization and its context 4.2 Understanding the needs and expectations of interested parties 4.3 Determining the scope of the XXX management system 4.4 XXX management system 5. Leadership 5.1 Leadership and commitment 5.2 Policy 5.3 Organizational roles, responsibilities and authorities Where the text “XXX” appears, the appropriate reference should be inserted depending on the context. For example: “an XXX objective” could be substituted as “an information security objective”. © 2018 ISO/IEC All Rights Reserved
10
MSS High Level Structure (2)
6. Planning 6.1 Actions to address risks and opportunities 6.2 XXX objectives and planning to achieve them 7. Support 7.1 Resources 7.2 Competence 7.3 Awareness 7.4 Communication 7.5 Documented information General Creating and updating Control of documented information © 2018 ISO/IEC All Rights Reserved
11
MSS High Level Structure (3)
This is the clause where most discipline-specific detail is expected to be added 8. Operation 8.1 Operational planning and control 9. Performance evaluation 9.1 Monitoring, measurement, analysis and evaluation 9.2 Internal audit 9.3 Management review 10. Improvement 10.1 Nonconformity and corrective action 10.2 Continual improvement © 2018 ISO/IEC All Rights Reserved
12
© 2018 ISO/IEC All Rights Reserved
MSS Issues It is a big improvement, but… It won’t be perfect You can’t tell anything about a standard unless you go down into the detail – they all look the same at the top. Some clauses in different standards will have significant differences in the additions. © 2018 ISO/IEC All Rights Reserved
13
IT & Physical Asset Management
ISO ITAM Version 3 written in coordination with ISO 55001:2014 for physical asset management is a “discipline-specific extension” of 55001, with changes Both are based on same ISO MSS headings and text is not a “sector-specific application” of 55001 Conformance with does not mean conformance with (although achieving conformance should be easy) Extensions are especially to deal with software & licensing; also providing for tiers Major change from is use of risk management approach taken from 27001; all changes detailed in Annex D © 2018 ISO/IEC All Rights Reserved
14
SAM/ITAM Extensions (1)
Need for extensions because of specific software characteristics Difficulty of controlling Difficulty of controlling modification, duplication and distribution Difficulty of reconciling with other systems Complexity Flexibility of location Number of components Rate of change Versioning of components Licensing Detailed in Annex C o Flexibility of location. Software may be stored or installed in one location, but accessed or used from additional instances or locations, e.g. using virtual machines; for cloud-based services such as SaaS, PaaS and IaaS; and generally via network access to server-based software. © 2018 ISO/IEC All Rights Reserved
15
SAM/ITAM Extensions (2)
Nature of extensions Controls over software modification, duplication and distribution, with particular emphasis on access and integrity controls Audit trails of authorizations and of changes made to IT assets Controls over licensing, underlicensing, overlicensing, and compliance with licensing terms and conditions Controls over situations involving mixed ownership and responsibilities, such as in cloud computing and with ‘Bring-Your-Own-Device’ (BYOD) practices Reconciliation of IT asset management data with data in other information systems when justified by business value, in particular with financial information systems recording assets and expenses See also Introduction o Flexibility of location. Software may be stored or installed in one location, but accessed or used from additional instances or locations, e.g. using virtual machines; for cloud-based services such as SaaS, PaaS and IaaS; and generally via network access to server-based software. © 2018 ISO/IEC All Rights Reserved
16
Overview of :2017
17
© 2018 ISO/IEC All Rights Reserved
Tiers (1) © 2018 ISO/IEC All Rights Reserved
18
© 2018 ISO/IEC All Rights Reserved
Tiers (2) Tiers are additional to “Management System Processes for IT Asset Management” Tiers are suggested groupings of operational objectives from Annex A Use of these names and groupings is optional but highly recommended Tier 1 objectives are already included in main body of standard and are mandatory Called “Trustworthy Data” Includes Change Management, Data Management, License Management, and Security Management Tier 2 & 3 groupings of objectives are additional and optional Intended to be cumulative © 2018 ISO/IEC All Rights Reserved
19
Tier 1 - Required
20
Tier 2 - Optional
21
Tier 3 - Optional
22
© 2018 ISO/IEC All Rights Reserved
Ed 3 Contents (1) Foreword Introduction 1 Scope 1.1 Purpose 1.2 Field of application 1.3 Limitations 2 Normative references 3 Terms and definitions 4 Context of the organization 4.1 Understanding the organization and its context 4.2 Understanding the needs and expectations of stakeholders 4.3 Determining the scope of the IT asset management system 4.4 IT asset management system 5 Leadership 5.1 Leadership and commitment 5.2 Policy 5.3 Organizational roles, responsibilities and authorities Headings/content in black are required by ISO Headings/content in green were added by 55001 Headings/content in red were added by © 2018 ISO/IEC All Rights Reserved
23
© 2018 ISO/IEC All Rights Reserved
Ed 3 Contents (2) 6 Planning 6.1 Actions to address risks and opportunities for the IT asset management system General IT asset risk assessment IT asset risk treatment 6.2 IT asset management objectives and planning to achieve them IT asset management operation process specification IT asset management objectives for operation processes Overall IT asset management objectives Planning to achieve IT asset management objectives © 2018 ISO/IEC All Rights Reserved
24
© 2018 ISO/IEC All Rights Reserved
Ed 3 Contents (3) 7 Support 7.1 Resources 7.2 Competence 7.3 Awareness 7.4 Communication 7.5 Information requirements 7.6 Documented information General Traceability of ownership and responsibility Audit trails of authorizations and execution of authorizations Creating and updating Control of documented information © 2018 ISO/IEC All Rights Reserved
25
Ed 3 Contents (4) 8 Operation 8.1 Operational planning and control 8.2 Management of change 8.3 Core data management 8.4 License management 8.5 Security management 8.6 Other processes 8.7 Outsourcing and services 8.8 Mixed responsibilities between the organization and its personnel 9 Performance evaluation 9.1 Monitoring, measurement, analysis and evaluation 9.2 Internal audit 9.3 Management review } Tier 1 For adding other processes especially Tiers 2 & 3 © 2018 ISO/IEC All Rights Reserved
26
© 2018 ISO/IEC All Rights Reserved
Ed 3 Contents (5) 10 Improvement 10.1 Nonconformity and corrective action 10.2 Preventive action 10.3 Continual improvement Annex A (normative) IT asset management operation processes and objectives Annex B (informative) IT asset management tiers Annex C (informative) Characteristics of IT assets Annex D (informative) Changes from ISO 55001 © 2018 ISO/IEC All Rights Reserved
27
Organizational Certification
Editions 1 & 2 Different approach to most other standards (and more difficult) because of SC7 requirements for WG21 at time of writing See references for details on organizations certified Edition 3 (MSS) All MSS auditors will be capable of certifying (especially organizations which certify against 27001) But need to have appropriate subject-matter expertise Can be contracted in from SAM/ITAM specialist organizations © 2018 ISO/IEC All Rights Reserved
28
© 2018 ISO/IEC All Rights Reserved
How to Get Involved Formally, through ISO national bodies ANSI for US – contact BSI for UK DIN for Germany AFNOR for France Etc Potentially via liaison bodies IAITAM SAMAC (Japan) TagVault © 2018 ISO/IEC All Rights Reserved
29
© 2018 ISO/IEC All Rights Reserved
Where to Obtain ISO ( CHF 158 ANSI ( $185 BSI ( £224 (members £112) Other national standards bodies and commercial sources © 2018 ISO/IEC All Rights Reserved
30
© 2018 ISO/IEC All Rights Reserved
Questions? © 2018 ISO/IEC All Rights Reserved
31
© 2018 ISO/IEC All Rights Reserved
References ISO free preview of including all terms and definitions ( ISO ITAM/SAM overview and terminology: freely available standard ( en.wikipedia.org/wiki/ISO/IEC_19770 m-assure.com/blog-links ISO SAM certifications Unique characteristics of IT assets © 2018 ISO/IEC All Rights Reserved
32
ITAM and Information Security Using 27001:2013 and 19770-1:2017 Together
33
© 2018 ISO/IEC All Rights Reserved
Contents Interdependence of ISM and ITAM Common design approaches Risk management Selection of objectives from a normative annex Documentation needed for assessment Other linkages from Driving effective integration Other ITAM/ISM standards Other observations Take-up opportunities © 2018 ISO/IEC All Rights Reserved
34
Interdependence of ISM and ITAM
General principle: You can’t manage what you don’t know. Both ISM and ITAM require complete and accurate knowledge of assets Highest priority critical security controls are all ITAM controls ( #1: Inventory of Authorized and Unauthorized Devices #2: Inventory of Authorized and Unauthorized Software #3: Secure Configurations for Hardware and Software Asset management is the first requirement of the framework core of the US Cybersecurity Framework (NIST, 12 Feb 2014) © 2018 ISO/IEC All Rights Reserved
35
Common Design Approaches
Risk management Selection of objectives from a normative annex Documentation needed for assessment © 2018 ISO/IEC All Rights Reserved
36
© 2018 ISO/IEC All Rights Reserved
Risk Management Risk assessment 27001, Information security risk assessment , IT asset risk assessment Risk treatment 27001, Information security risk treatment , IT asset risk treatment © 2018 ISO/IEC All Rights Reserved
37
© 2018 ISO/IEC All Rights Reserved
Selection from Annex 27001: Select control objectives (and related controls) from normative Annex A. Selection is by elimination – all not included must be justified. : Select process objectives from normative Annex A. Selection is by addition – justification must be given for those chosen ‘Tiers’ are pre-defined groupings of process objectives, as defined in Annex B. Tier 1: Trustworthy data: already included in base text Tier 2: Lifecycle integration: all lifecycle processes Tier 3: Optimization: remaining functional processes e.g. contract management © 2018 ISO/IEC All Rights Reserved
38
Assessment Documentation
Statement of Scope Statement of Applicability 6.2.2 IT asset management objectives for operation processes The organization shall determine the objectives which are appropriate for the operation processes identified in The objectives determined in this way shall be compared with those in Annex A. A Statement of Applicability shall be produced which lists the objectives specified, with justification for inclusion and exclusion of any listed in Annex A. NOTE 1 The processes and process objectives listed in Annex A are not exhaustive and additional operation processes and process objectives can be needed. NOTE 2 The term ‘Statement of Applicability’ has been chosen because of its analogy with the Statement of Applicability in ISO/IEC 27001:2013. The Statement of Applicability together with the scope definition (4.3) are needed by any internal or external party to understand what is covered by the IT asset management system. NOTE 3 It is possible but not required to specify groupings of processes and process objectives for inclusion or exclusion based on their tier classification as described in Annex B. © 2018 ISO/IEC All Rights Reserved
39
© 2018 ISO/IEC All Rights Reserved
Other Linkages from Added to Clause 4.2, a note that stakeholders (27001 and use the term ‘interested parties’ – both are acceptable for ISO) include those responsible for related systems and processes, such as for Information Security Management, and Service Management Added to Clause 5.2, requirements that the IT asset management policy shall be consistent with (a) the strategic plans of any other management systems used by the organization; and with (b) the relevant policies of any other management systems used by the organization. © 2018 ISO/IEC All Rights Reserved
40
Driving Effective Integration
Integrated management systems for ISM and ITAM Common membership of key committees (e.g. change management board) Common high-level corporate/organizational policies Common reporting lines Improved tools © 2018 ISO/IEC All Rights Reserved
41
© 2018 ISO/IEC All Rights Reserved
Tools Trending towards functional convergence, but not there Timeliness ISM: Requires immediate availability of information ITAM: Often just used for periodic license compliance Coverage ISM: Identification most important; knowledge of all instances generally not ITAM: Generally requires knowledge of all instances Authorization focus ISM: Critical ITAM: Typically weak functionality © 2018 ISO/IEC All Rights Reserved
42
Other ITAM/ISM Standards
:2015 Software Identification Tag Facilitates security automation Mandatory per US Department of Defense IT Standards Registry Supported by publications from NIST, Trusted Computing Group, etc See also tagvault.org © 2018 ISO/IEC All Rights Reserved
43
© 2018 ISO/IEC All Rights Reserved
Other Observations Inventory of Information: in 27001, not in © 2018 ISO/IEC All Rights Reserved
44
Take-Up Opportunities
Any organization looking to implement or Consultancy organizations helping to implement either Certification bodies wishing to extend certifications Promotional/engagement Joining WG21 or the development group Blogging, posting etc Presenting at conferences © 2018 ISO/IEC All Rights Reserved
45
© 2018 ISO/IEC All Rights Reserved
Questions? © 2018 ISO/IEC All Rights Reserved
46
© 2018 ISO/IEC All Rights Reserved
HISTORICAL © 2018 ISO/IEC All Rights Reserved
47
© 2018 ISO/IEC All Rights Reserved
Historical Overview Edition 1: 2006 Edition 2: 2012 © 2018 ISO/IEC All Rights Reserved
48
© 2018 ISO/IEC All Rights Reserved
SAM Processes – in Gen 2 © 2018 ISO/IEC All Rights Reserved
49
© 2018 ISO/IEC All Rights Reserved
SAM Tiers – in Gen 2 © 2018 ISO/IEC All Rights Reserved
50
© 2018 ISO/IEC All Rights Reserved
Impact of Gens 1 & 2 Considered one of ISO’s successful standards But sales statistics not released!!! Translated into Chinese, French, German, Japanese, Russian, Spanish, and Swedish © 2018 ISO/IEC All Rights Reserved
51
Supplemental materials
© 2018 ISO/IEC All Rights Reserved
52
MSS High Level Structure
Scope Normative references Terms and definitions Context of the organisation Leadership Planning Support Operation [typically with the most added detail for MSSs] Performance evaluation Improvement © 2018 ISO/IEC All Rights Reserved
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.