Overview
The main objective of an Information Security Management Systems or ISMS,
as the name implies is, for an organization to design, implement and
maintain a understandable and clearly defined suite of processes and systems
for effectively managing information security, thus ensuring the
confidentiality, integrity and availability of information assets and
minimizing information security risks. As with all management processes, an
ISMS must remain effective and efficient in the long term, adapting to changes
in the internal organization and external environment. The best known ISMS is
described in ISO/IEC 27001 related standards published jointly by ISO and IEC.
The Internet gateway of an organization is expected to provide security
to its information resources in the internal network from the Internet. To implement the
ISMS it should be considered the internet gateway as the Information System. Implementing
an ISMS is consists with four major phases; Plan, Do, Check and Act.
Plan is about designing the ISMS, estimating information
security risks and selecting appropriate controls.
Do is all about implementing and operating the controls.
Check phase's objective
is to review and evaluate the efficiency and effectiveness, basically the
performance of the ISMS.
Act phase, changes
are made where necessary to bring the ISMS back to peak performance.
Steps to follow to implement ISMS for your organization
Firstly, the top
management needs to have a better understanding of what the information
security management and how it affects for the organizations information
protection. Support from the top management of the organization, and their
commitment to and understanding of the problems of information security was
seen as one of the most important success factors for an efficient
implementation of ISMS.
The commanding
capability would appreciate from the top management sponsorship for the success
of the project. It is this capability that gives the project the authority to
decide on issues regarding information security. Without any real
decision-making power, it is very hard, if not impossible to do reach the
project goals.
Well structured project
plan is another factor of successful ISMS implementation. Goals, resources and
the time plan for the project are developed and documented in a project
description, and that the resources in the project are well balanced.
Also, all information
security projects need budgeted resources. A project without this capability is
unable to estimate costs realistically.
Most of the ISMS
implementations stop at security manager’s level. To avoid that regular
communication with the people involved in the project is need.
Projects with better
analytic capability can accurately analyze the preceding security situation,
and therefore develop a well balanced ISMS which is also incorporated with
existing management systems.
Communication and
Operations management have to be done properly for a better implementation of
ISMS. When planning the system we have to consider about the future
requirements as well. It is the most crucial part in planning process.
Considering performance, future capacity management has to be done since it
leads the ISMS to achieve its goals in a proper manner. Without considering the
future capacity requirements it is difficult to handle upgrades that have to do
to the ISMS in the future.
Protection against malicious and mobile code
is also has to be considered when talking about future requirements. Detection,
prevention and recovery against future threats also need. It can be achieved by
a better risk-analysis. Proper backup systems are another factor for better
ISMS.
Another aspect we have to consider is access control when think of a
better implementation of ISMS. The main consideration is a better access policy
in this aspect. User access management,
user responsibilities, operating system access controls have to be maintained
for better access control strategy.
Motivation of individuals participating in the ISMS project, such as project
participants, project managers, and those responsible for different areas in
the organization is a must for an efficient implementation. After the
development of the ISMS, it will also have to be implemented, and at that stage
the importance of this success factor grow – at that time; all employees
in the whole organization will have to be motivated to adhere to the rules.
Further, they should regularly use the technical solutions that the projects
have developed and the management decided on –they need motivation.
Thinking about security
and writing policies as I mentioned in my last post is one thing, Implementing
the ideas, rules, controls, and procedures is another. The executive capability
is that the project can do things. One of the things that will need to be done
is to put the policy into practice and this in turn often requires for example
the ability to influence people in the IT department, in IT development and in
other parts of the organization.
Though
ISMS involved with the IT department we have to look at it as a whole of the
organization. That is called as the holistic approach. This is another plus
approach for a better implementation of the project. It is mainly the
connection between the information security and the organizations foundation
activities that is seen as important, that the ISMS does take into account and
that it covers the whole organization, so that the ISMS does not end at the
security or IT department.
When
considering ISMS implementation formal configuration management plan is a must.
Without a proper configuration plan accidental mis-configurations can happen in
network devices such as firewalls. This would lead to a security breach of the
organization. For all the hardware and software that are using in the ISMS must
have appropriate warranties and warranty period must be negotiable.
Also other than motivating employees to stick
those rules, have to instruct them to keep their Desktops, Laptops and Mobile
devices up-to-date with patches. All the organization PCs and Laptops must be
standardized on a licensed OS.
These are some of the
usages of an ISMS that identified by ourselves referring to ISO/IEC27001 and
ISMS7799.
- Identification and clarification of
existing information security management processes.
- Formulation of security requirements and
objectives.
- To ensure that security risks are cost
effectively managed.
- To ensure agreement with laws and
regulations.
- As a process framework for the
implementation and management of controls to ensure that the specific security
objectives of an organization are met.
- To be used by management to determine the
status of information security management activities.
- To be used by internal and external
auditors to determine the degree of compliance with the policies, directives
and standards adopted by an organization.
- To provide relevant information about
information security policies, commands, standards and procedures to
trading partners.
- To provide relevant information about
information security to customers.
