- Service Reporting
- CSI Overview
- ITIL - Access Management
- ITIL - Problem Management
- ITIL - Incident and Request
- ITIL - Event Management
- ITIL - Service Operation Overview
- ITIL - Service and Validation Testing
- Release and Deployment Management
- Service Assets and Configuration Management
- ITIL - Change Management
- ITIL - Project Management
- ITIL - Service Transition Overview
- ITIL - Supplier Management
- Information Security Management
- ITIL - Service Continuity Management
- ITIL - Availability Management
- ITIL - Capacity Management
- ITIL - Service Level Management
- ITIL - Service Catalogue Management
- ITIL - Service Design Overview
- ITIL - Financial Management
- ITIL - Demand Management
- Business Relationship Management
- ITIL - Service Portfolio Management
- ITIL - Strategy Generation
- ITIL - Service Strategy Roles
- ITIL - Service Strategy Overview
- ITIL - Service Lifecycle
- ITIL - Service Basics
- ITIL - Terminologies
- ITIL - Overview
- ITIL - Home
ITIL Useful Resources
Selected Reading
- Who is Who
- Computer Glossary
- HR Interview Questions
- Effective Resume Writing
- Questions and Answers
- UPSC IAS Exams Notes
ITIL - Information Security Management
Information Security Management (ISM) ensures confidentiapty, authenticity, non-repudiation, integrity, and availabipty of organization data and IT services. It also ensures reasonable use of organization’s information resources and appropriate management of information security risks.
Information Security Manager is the process owner of this process.
Information security is considered to be met when −
Information is observed or disclosed on only authorized persons
Information is complete, accurate and protected against unauthorized access (integrity)
Information is available and usable when required, and the systems providing the information resist attack and recover from or prevent failures (availabipty)
Business transaction as well information exchanges between enterprises, or with partners, can be trusted (authenticity and non-repudiation)
ISM Security Popcy
It is required for ISM security popcies cover all areas of security, be appropriate, meet the needs of business and should include the popcies shown in the following diagram −
ISM Framework
ISM Process
The following diagram shows the entire process of Information Security Management (ISM) −
Key elements in ISM Framework
ISM framework involves the following key elements −
Control
The objective of Control element is to −
Estabpsh an organization structure to prepare, approve and implement the information security popcy
Allocate responsibipties
Estabpsh and control documentation
Plan
The purpose of this element is to devise and recommend the appropriate security measures, based on an understanding of the requirements of the organization.
Implement
This key element ensures that appropriate procedures, tools and controls are in place to underpin the security popcy.
Evaluation
The objective of Evaluation element is to −
Carry out regular audits of the technical security of IT systems
Supervise and check comppance with security popcy and security requirements in SLAs and OLAs
Maintain
The objective of Maintain element is to −
Improve on security agreements as specified in, for example, SLAs and OLAs
Improve the implementation of security measures and controls
Preventive
This key element ensures prevention from security incidents to occur. Measures such as control of access rights, authorization, identification, and authentication and access control are required for this preventive security measures to be effective.
Reductive
It deals with minimizing any possible damage that may occur.
Detective
It is important to detect any security incident as soon as possible.
Repressive
This measure is used to counteract any repetition of security incident.
Corrective
This measure ensures damage is repaired as far as possible.
Advertisements