160 likes | 281 Views
Sourcing & Management of Information Security. Sébastien BOMBAL 4 th March 2011. Sourcing & information security ?. From outsourcing IT in the 1960s… To “cloud computing” in 2011 Why ? Still same objectives since the 60s Increasing focus on core competencies
E N D
Sourcing & Management of Information Security Sébastien BOMBAL 4th March 2011
Sourcing & information security ? • From outsourcing IT in the 1960s… To “cloud computing” in 2011 • Why ? Still same objectives since the 60s • Increasing focus on core competencies • Increasing competitive pressure (optimizing run cost and investment) • Accessing world class capabilities, best practices • Sharing risk…. • What ? From routine and non critical tasks… To strategic processes that directly impact revenues. • Where (is my data) ? From your IT rooms… To a worldwide cyberspace. • Who ? From an identified subcontractor To cascaded subcontracting (chain of trust ?).
Sourcing and common problems for security • Risk : Data theft, leak or unavailability • Data falls in competitors’ hands • Publicized data leakage, thief or unavailability • Objectives not reached (cost, time, effectiveness and efficiency) • Important details to check : • SLA (predefined non-negotiable agreements and negotiated agreements) • Licensing • criteria for acceptable use • service suspension, termination, limitations on liability • privacy policy • modifications to the terms of service • Audit capability • Data ownership and their localizations • Mutualized or dedicated • Measurement of service effectiveness • Compliance with laws and regulations • Use of validated products and vetting of employees • And don’t forget : • Erosion of in-house knowledge
Deploying ISO 27001 - best practices ? • Using a certified ISO 27001 service provider ? • Not really useful… • Tasks : More detailshttp://www.club-27001.fr/supports/2009-06-11_AREVA.pdf • Asset classification • Contracts • Risk management • Audits / reporting • Incidents Management • Dashboards • Awareness Plan Do + Act Check
Classify your assets with an outsourced IS • The longest task is inventory Inventory management is a difficult process • This can be even easier • Case of leasing • Case of ASP, SaaS, PaaS, IaaS, … • Even if everything is outsourced, do not forget your own assets • Human resources, sites, documentation, file servers .
Deploying ISO 27001 - best practices ? • Using a certified ISO 27001 service provider ? • Not really useful… • Tasks : More detailshttp://www.club-27001.fr/supports/2009-06-11_AREVA.pdf • Asset classification • Contracts • Risk management • Audits / reporting • Incidents Management • Dashboards • Awareness Plan Do + Act Check Why not use best practices for contract management ? Like eSCM…
In a very few words : eSCM • The eSourcing Capability Models are best practices • For Client organization : eSCM-CL • For Service provider : eSCM-SP To successfully manage your IT sourcing life cycle. • eSCM-CL a framework with 95 practices (measures) in 17 domains • Through capability levels evaluation : • Level 1 : Performing sourcing at least you are level 1 • Level 2 : Consistently Managing sourcing • Level 3 : Managing organizational sourcing performance • Level 4 : Proactively enhancing value • Level 5 : Sustaining excellence at least two consecutive years at level 4 • Maintained and published by ITSQC : http://www.itsqc.org/
Sourcing relationships & Information Security Management (ISM)
Deploying ISO 27001 - feedbacks ? • Use ISO 27001 to reposition security and risk management as a support to the IS Management • Limit the scope & responsibilities : contract, service agreement, RACI, … and by side effect the scope to be certified • Should be done for in-sourcing model • Involve service providers (SP) in your risk management process • Maintain reasonable risk treatment plans • Mix it with the different improvement plans • Audit & control SP commitments and evaluate your operational risk • Define and use dashboards and reports • “Facts and Figures” • Contracts are mostly managed through indicators & KPI
And my cloud ? • What is « Cloud computing » for an IS function ? Just a change of state of mind… not an outsourcing focus. • Providing self-service resources to your business • Standardizing and automating • Providing service catalogue • Tracking resources and cost. • Implementing showback and chargeback processes (ABC1 and ABM2) • Managing capacity planning • And as usual you can “make … or buy” 1 : ABC : Activity Based Costing 2 : ABM : Activity Based Modeling
Managing extended IS COBIT Management system with a PDCA (Plan Do Check Act) approach ISO 9001 ISO 27001 ISO 14001 Security measures comes from ISO 27002, but some of them are redundant or complete ITIL and eSCM ITIL eSCM-CL ISO 27002 Security measure to include in the contract
eSCM-CL practices versus ISO 27002 (1/2) Linked with your ISO 27001 governance security involvement needed Audit and control
eSCM-CL practices versus ISO 27002 (2/2) security involvement needed Linked with your 27001 SOA v At least level 2 maturity for eSCM seems to be enough with a few level 3 measures
In conclusion • Strong accelerating of security awareness in sourcing • new players with cloud computing • loss of view of data location • ISO 27001 in an outsourced IS • Manage contracts • Limit the scope for the auditor with contracts or agreements • Implement an asset management process to control security … and invoice. • ISO 27001 is complementary with other methods like eSCM-CLbut these methods are not a substitute for continuous improvement of security • eSCM-CL can help you in your ISO 27001 project • Keep things simple ! • Risk management • Security target.
Bibliography • eSCM official website : www.itsqc.org • NIST : « Guidelines on Security and Privacy in Public Cloud Computing » • Yesser / e-government program of Saudi Arabia : «BEST PRACTICES FOR IT SOURCING» • Gartner – “Sourcing Strategies-Relationship Models And Case Studies”
Questions ? Thanks for your attention sebastien@bombal.org