security management and itil - wordpress.com• late 80’s, the first version of itil® v1 –...

26
Full Service Management Solutions © 2012 C2 Innovations Inc. All rights reserved Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved Security Management and ITIL ®

Upload: others

Post on 11-Aug-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

Full Service Management Solutions © 2012 C2 Innovations Inc. All rights reserved

Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

Security Management

and ITIL®

Page 2: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

2 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

Service

Strategy

Design

Service

Service

Transition

Service

Operation

Continual

Service

Improvement

Julius Caesar is credited with the invention of the Caesar cipher ca. 50 B.C., which was created in order to

prevent his secret messages from being read should a message fall into the wrong hands, but for the most part

protection was achieved through the application of procedural handling controls. Sensitive information was

marked up to indicate that it should be protected and transported by trusted persons, guarded and stored in a

secure environment or strong box. As postal services expanded governments created official organisations to

intercept, decipher, read and reseal letters (e.g. the UK Secret Office and Deciphering Branch in 1653).

Wow, if I had ITIL ® V3

and better processes ,

I might have lived

longer!

History of Information Security and ITIL®

Page 3: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

3 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

Statistics Incident reported

Num

ber o

f incid

ents

Years

Page 4: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

4 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

Statistics

• ‟The total losses in 2004 by 269 companies as a result of a computer security incident has reached a total of $ 141.5 million, which is an average of 526 000 per company. ”

Reference : ‟2004 CSI/FBI Computer Crime and Security Survey” Computer Security Institute, 2004.

• ‟93% of companies that have experienced a disaster and did not backup their data disappeared.”

Reference : ‟Disaster Recovery”, Interex 98 Conference, May 12, 1998.

• ‟Several surveys have shown that about half of attacks against computer systems came from inside the company.”

Reference : ‟2004 CSI/FBI Computer Crime and Security Survey” Computer Security Institute, 2004.

Page 5: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

5 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

How to manage

and control

information security?

A sound security

management

should be based

on well-

established

processes

Page 6: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

ITIL® and the

Management

of Information

Security

Page 7: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

7 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

• Late 80’s, the first version of ITIL® V1

– Security management almost nonexistent.

• 2001 ITIL® V2

– Safety management introduced within the process of managing availability.

– The security management is primarily guided by the principle that IT security provides: Confidentiality, Integrity and Availability (CIA) of information. Rather focused on technology.

History of Information Security and ITIL®

Page 8: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

8 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

History of Information Security and ITIL®

• 2007 ITIL® V3

– Formal recognition that Security Management is an important process in ITSM and its life cycle.

– Mainly used in the design, transition, and operations of IT services.

– Axée sur la gestion de service tout au long du cycle de vie.

– Focused on Service Management throughout the lifecycle.

– Link established with ISO 27001.

Page 9: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

9 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

• WARRANTY of service

– An assurance that some products or services will be provided or that they meet certain specifications.

– (e.g.: available when needed, where the quality and reliability are sufficient in terms of

continuity and security)

= Suitable for use

• The WARRANTY reduces

variation in performance.

• UTILITY of a service

– Service attributes that have a positive effect on the execution of activities, objects and tasks associated with the outcome.

– The removal or reduction of

constraints on the execution may also have a positive

effect.

= Adapted to the needs

• The average UTILITY increases performance. Interpreted as a guaranteed

element

But security is also a useful factor for an organization

Key Concept - Elements of Value Creation: Utility and Warranty

Page 10: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

10 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

LOST/STOLEN

Objective: Align IT security on the security of the business and ensure that

information security is effectively managed in all departments and

in all activities of management services

Information Security Management - Concepts

• Related with ISO/IEC 27001

• Is not documented as a business process, but rather a strategic one.

• Support processes to all other IT Service Management processes

Page 11: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

11 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

Plan Agreements on Service Levels

Outsourcing Contracts

Operational Level Agreements

Policy Statements

Enforce Sensitization

Classification and Recording

Staff Security

Physical Security

Networks, Applications, Computers

Access Rights Management

Procedures related to Security Incidents

CONTROL Organize

Establish a Framework Assign Responsibilities

Maintain Learn

Improve

Plan

Enforce

Evaluate Internal Audits

External Audits

Self-assessments

Security Incidents

Information Security Management - Concepts

Page 12: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

12 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

The problem -

the model does not prove

that IT security management

is involved in all the

processes of ITSM

Scope of the ITIL® framework and lifecycle services

© Crown Copyright 2007. Reproduced under Licence from OGC.

Page 13: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

Point of view and

suggestions on

Managing

Information

Security

in relation to

the IT Services

Management

Page 14: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

14 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

The reality of the security management information

• Subject that management would like to avoid

• Seen as a cost rather than a value

• People who work in this field are sometimes regarded as not being in line with the needs of business

• The subject can put someone to sleep in 5.4 seconds

• Connect the concepts of security management with the reality of business is difficult

Page 15: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

15 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

Increase your revenues

Rationalize the cost of services

Meet your obligations

Enhance the customer and user experience

1

Improve internal efficiency

2

3

4

5

Why improve the ITSM ... 5 Business Reasons

Page 16: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

16 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

Connect IT Security Management to the Broad Objectives of ITSM

• Improve the alignment of IM / IT with business strategy

– All elements of the ITSM policy related to the business security policy

• Improving expectations in terms of customer and internal IM / IT service

– Have a catalog that connects customer service to the technical security management services

• Better understanding of cost factors associated to the IM / IT performance services

– Link your customer service to technical safety service to understand the real cost of managing security.

– Our experience on the additional costs of security management is in many cases, only 0.65% of the total requests made to the supplier

Page 17: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

17 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

Connect IT Security Management to the Broad Objectives of ITSM

• Improve the efficiency of the IM / IT Group

– Ensure that any major change has an impact analysis related to safety

• Enable the successful implementation of the agreements (ANS, ANO)

– Include the value of IT Security in agreements

– Example: Service level achieved if we mitigates the security issues

Page 18: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

18 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

ITIL ® Processes (partial list) Recommended Concepts

ITSM Process Benefits to Security Management

Incident Management Troubleshooting with impact on safety. Confirmation of the use and understanding of the security policy

Change Management All changes must have an assessment on the impact of the security

Configuration Management Confirmation that security is an attribute of all the infrastructure components

Service Level Management Security is a standard element of negotiation and agreements

Catalog Service Management Visualize the dependence of customer services on the security services

Page 19: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

19 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

Delivery Chain - Security Service Management

Security business

policy Security policy of the IT organization

Guidance

on the use of

IT services

Agreement Support/

Delivery

Project/

Change Build/Deploy

Security policy of the organization

Project Managers Analysts, Architects

Developers, Etc…

Operations Service Desk

Help Desk Technical Support

Business Clients

Users Consumers

Executives / BRM

Page 20: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

20 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

Linking Security Management to the chain of service performances ...

What would be the effect if the information was

used by someone from the outside?

Is this in line with the IT strategy?

Do we have the budgets? What would be the

effect if the information was used by someone

from the outside?

What level of security are we going

to need for this service and what

mechanism / technology should

we use?

Have you been trained on the

security policy and on the security elements of the

procedures?

Do I have the rights to see this

information or do I have

access to this request?

Fournisseurs de service Using a business case approach speaking of security management

Project Managers Analysts, Architects

Developers, Etc…

Operations Service Desk

Help Desk Technical Support

Business Clients

Users Consumers

Executives / BRM

Agreement Support/

Delivery

Project/

Change Build/Deploy

Page 21: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

21 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

Scope of the ITIL® framework and lifecycle services

Elements

of information

security

Elements

of information

security

Elements

of information

security

Elements

of information

security

Elements

of information

security

The REAL INTERPRETATION for a security management

that has a maximum value

Page 22: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

22 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

Bu

sin

ess V

iew

Tech

nic

al V

iew

Business Service Catalogue

Automated Corporate

solutions delivery and

operation

Automated Client-specific

solutions delivery and

operation

End User Computing IT Infrastructure solutions

delivery and operation

Busin

ess A

naly

sis

Desig

n a

nd D

ev.

Imple

menta

tion

Monitoring &

Support

Pro

cure

ment

Optim

ization

Applic

ation M

gm

t

xx

xx

xx

xx

xx

xx

xx

xx

xx

xx

xx

xx

xx

xx

Access M

gm

t

Busin

ess A

naly

sis

Desig

n a

nd D

ev.

Imple

menta

tion

Monitoring &

Support

Pro

cure

ment

Optim

ization

Applic

ation M

gm

t

Access M

gm

t Technical Service Catalogue**

Application Dev /

Maintenance

Database Dev /

Maintenance

Deployment

Integration

Engineering &

Testing

Certification /

Release

Workstation

Desktop & Office

Productivity Suite

Workgroup

Collaborative

Email &

Directory*

File / Print*

Remote Access*

IT Environment

Protection

Identification,

Authentication &

Authorization

Secure

Communications

Perimeter

Defence,

Detection,

Response,

Recovery & Audit

Utility

Computing*

Dedicated

Application

Hosting &

Management

Facilities

Management*

Data Network

Infrastructure*

Inter & Intra Data

Centre Network* Service Desk

Highlighting Security Management services in the catalog of services ... an example

Page 23: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

23 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

To be used for the development of procedures and work instructions

ITSM Integration Table processes of ITIL® Process: Security Management

ITIL® Process Security Management

given to... Given to the

Security Management ...

Incident Scale to categorize an incident as having an impact on safety

Statistics on incident safety type

Assistance in the investigation and resolution of security type incidents

Troubleshooting analysis

Page 24: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

24 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

Roles

• Clients / Users

• Customer Relationship Manager (CRM)

• Software Manager

• Security Information Management

• Architecture and Planning

• Project Management Office

• Service Center

• Financial Management

• Infrastructure Management

• Etc.

• ‟ Security Relations Manager“: responsible for managing relationships with all internal the supplier groups and having a business approach — the bridge between the security jargon and the terminology case. Negotiates agreements with other operational IT sectors and ITSM processes.

Page 25: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

25 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

Some Recommendations

• Create and assign the Relationship Manager role – Security

• Link the Security Management activities to the major ITSM business objectives

• Involve the Security Manager in all processes improvements of the Service Management Processes

• Include services from the security management into the services catalog, and linking to customer service

• Develop and negotiate operational level agreements (OLA) with all other IT sectors

• Hold a safety element in your ITSM improvement projects. Ex: in the process documents have a section called ‟Integrating safety information”

Page 26: Security Management and ITIL - WordPress.com• Late 80’s, the first version of ITIL® V1 – Security management almost nonexistent. • 2001 ITIL® V2 –Safety management introduced

26 Full Service IT Management Solutions © 2012 C2 Innovations Inc. All rights reserved

In conclusion

• ITIL® has contributed and demonstrated the importance of security management

• For ITSM and ITIL® V3, the security management process is a strategic control to ensure safety perspective in other ITSM processes and activities.

• There is always a security activity in all ITSM processes

• A sound security management should be based on well-established processes in an organization

• The identification of activities related to safety in all ITSM processes represent the success of the security management