{"id":11625,"date":"2018-10-17T12:33:01","date_gmt":"2018-10-17T12:33:01","guid":{"rendered":"http:\/\/www.icterra.com\/partitioning-the-responsibilities-in-information-security\/"},"modified":"2021-01-29T08:35:08","modified_gmt":"2021-01-29T08:35:08","slug":"partitioning-the-responsibilities-in-information-security","status":"publish","type":"post","link":"https:\/\/www.icterra.com\/de\/partitioning-the-responsibilities-in-information-security\/","title":{"rendered":"Partitioning the Responsibilities in Information Security"},"content":{"rendered":"

Author:<\/strong> Mustafa Fikret Ottekin, Consultant \u2013 Cyber Security<\/p>\n

Probably the most common and serious mistake of managements regarding the governance of information security is delegating too much responsibility to the IT Department. This mistake is usually due to the belief that information security is a \u201cmostly technological\u201d problem which should be solved by mostly technological people, the IT experts. Well, this is not exactly the case. Let\u2019s try to draw the line correctly between the responsibilities of the management and the responsibilities of the IT department here.<\/p>\n

\"\"<\/p>\n

\n

I would like to focus on two separate stages of information security governance process: Risk analysis and risk mitigation.<\/p>\n

Risk analysis begins with the valuation of institution\u2019s assets in the most objective and realistic manner possible. Values of assets are deeply rooted in the value of information they process, which is proportional to the cause the information serves. In other words, the value of assets depend on the value of business or function they facilitate. At this stage, the responsibility of the management is designating the due value and priority of each business conducted by the institution, including related information. That task may be performed by the management alone. Neither IT experts nor the information security advisors may substitute the management at this stage. Yet, the values of all other (software, hardware, facility, etc.) assets may be derived by IT people following that first stage of business valuation.<\/p>\n

The second stage I want to take a look at is risk mitigation, where the security controls are applied on the daily life of the institution. Security controls may be divided into two categories:<\/p>\n

    \n
  1. Controls safeguarding confidentiality (All sorts of access control)<\/li>\n
  2. Controls safeguarding availability (Information backup and business continuity measures)<\/li>\n<\/ol>\n

    Access control may be broadly defined as assuring access to information on a \u201cneed-to-know\u201d basis. In that respect, the management has to designate which information may be accessed by whom. That designation is almost equal to deciding which task should be executed by which personnel or department. Again, neither IT experts nor the information security advisors may substitute the management to make that decision. After the \u201cneed-to-know\u201d basis is established by the management, the IT department may assume responsibility to apply that base consistently to application access control, network access control, physical access control etc. security controls.<\/p>\n

    Similarly, management has to decide the tolerable durations of interruption about access to information for all crucial business processes. The IT department may use that information to define and acquire the necessary information backup and business continuity systems.<\/p>\n

    To sum up, the management would define the security principles and the IT department would define the security controls that would apply these principles to the daily, ongoing execution of all business processes. (And the Internal Audit department, where available, would validate the proper implementation and operation of security controls\u2026) Along the information security governance process, management would also provide the budget required to implement the security controls and assure due execution of Internal Audit procedures.<\/p>\n

    Finally, the similarity between the forces present in \u201csegregation of duties\u201d; legislation, execution, jurisdiction and management, IT department and audit may be noticed easily. It may be concluded that correct application of \u201csegregation of duties\u201d in the domain of information security governance, in order to assure due security and functioning of an institution, is indisputable.<\/p>\n

    Published<\/span>\u00a0online\u00a0digital<\/span>\u00a0<\/span>magazine:
    \nhttp:\/\/www.btc.co.uk\/Articles\/index.php?mag=Security&page=compDetails&link=8978&fbclid=IwAR23KmJZQEQ69q2_zJK_cW0svr9nceXJzgS7ZLVQxCUvW4udEPQitn9m2-E<\/a>
    \n<\/span><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"

    Probably the most common and serious mistake of managements regarding the governance of information security is delegating too much responsibility to the IT Department.<\/p>\n","protected":false},"author":1,"featured_media":11626,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[127],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.icterra.com\/de\/wp-json\/wp\/v2\/posts\/11625"}],"collection":[{"href":"https:\/\/www.icterra.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.icterra.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.icterra.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.icterra.com\/de\/wp-json\/wp\/v2\/comments?post=11625"}],"version-history":[{"count":0,"href":"https:\/\/www.icterra.com\/de\/wp-json\/wp\/v2\/posts\/11625\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.icterra.com\/de\/wp-json\/wp\/v2\/media\/11626"}],"wp:attachment":[{"href":"https:\/\/www.icterra.com\/de\/wp-json\/wp\/v2\/media?parent=11625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.icterra.com\/de\/wp-json\/wp\/v2\/categories?post=11625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.icterra.com\/de\/wp-json\/wp\/v2\/tags?post=11625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}