IT Security Management: Difference between revisions

From IT Process Wiki
No edit summary
No edit summary
Line 1: Line 1:
<itpmch><title>IT Security Management | IT Process Wiki</title>
<itpmch><title>Information Security Management | IT Process Wiki</title>
<meta name="keywords" content="information security management, itil security management, security management itil, itil security management process, security management process" />
<meta name="keywords" content="information security management, itil security management, security management itil, itil security management process, security management process" />
<meta name="description" content="Information Security Management aims to ensure the confidentiality, integrity and availability of an organization's information, data and IT services. ITIL Security Management usually forms part of an organizational approach to security management which has a wider scope than the IT Service Provider." />  
<meta name="description" content="Information Security Management aims to ensure the confidentiality, integrity and availability of an organization's information, data and IT services. ITIL Security Management usually forms part of an organizational approach to security management which has a wider scope than the IT Service Provider." />  
<meta property="og:url" content="https://wiki.en.it-processmaps.com/index.php/IT_Security_Management" />
<meta property="og:url" content="https://wiki.en.it-processmaps.com/index.php/IT_Security_Management" />
<meta property="og:title" content="IT Security Management | IT Process Wiki" />
<meta property="og:title" content="Information Security Management | IT Process Wiki" />
<meta property="og:description" content="Information Security Management aims to ensure the confidentiality, integrity and availability of an organization's information, data and IT services. ITIL Security Management usually forms part of an organizational approach to security management which has a wider scope than the IT Service Provider." />
<meta property="og:description" content="Information Security Management aims to ensure the confidentiality, integrity and availability of an organization's information, data and IT services. ITIL Security Management usually forms part of an organizational approach to security management which has a wider scope than the IT Service Provider." />
<meta property="og:site_name" content="IT Process Wiki - the ITIL&#174; Wiki">
<meta property="og:site_name" content="IT Process Wiki - the ITIL&#174; Wiki">
Line 11: Line 11:
<meta property="fb:admins" content="100002592864414" />
<meta property="fb:admins" content="100002592864414" />
<meta property="og:image" content="https://wiki.en.it-processmaps.com/images/e/e7/Itil-security-management.jpg" />
<meta property="og:image" content="https://wiki.en.it-processmaps.com/images/e/e7/Itil-security-management.jpg" />
<meta property="og:image:width" content="960" />
<meta property="og:image:width" content="1200" />
<meta property="og:image:height" content="947" />
<meta property="og:image:height" content="1200" />
<meta name="twitter:card" content="summary">
<meta name="twitter:site" content="@itprocessmaps">
<meta name="twitter:creator" content="@itprocessmaps">
<meta name="twitter:title" content="Information Security Management | IT Process Wiki">
<meta name="twitter:description" content="Information Security Management aims to ensure the confidentiality, integrity and availability of an organization's information, data and IT services.">
<meta name="twitter:image" content="https://wiki.en.it-processmaps.com/images/thumb/e/e7/Itil-security-management.jpg/600px-Itil-security-management.jpg">
<meta name="twitter:image:alt" content="Overview of Information Security Management: This image illustrates the IT Security Management process according to ITIL, highlighting the most important interfaces of Security Management, its sub-processes and their interrelationships.">
<link href="https://plus.google.com/108613479011811316823/posts" rel="publisher" />
<link href="https://plus.google.com/108613479011811316823/posts" rel="publisher" />
</itpmch>
</itpmch>
Line 39: Line 46:


ITIL V3 treats Information Security Management as part of the Service Design core volume, resulting in a better integration of this process into the Service Lifecycle (the previous ITIL version provided guidance on Security Management in a separate book).  
ITIL V3 treats Information Security Management as part of the Service Design core volume, resulting in a better integration of this process into the Service Lifecycle (the previous ITIL version provided guidance on Security Management in a separate book).  
[[Image:Itil-security-management.jpg|right|thumb|375px|alt=Information Security Management ITIL|link=https://wiki.en.it-processmaps.com/index.php/File:Itil-security-management.jpg|[https://wiki.en.it-processmaps.com/images/pdf/process_overview_it_security_management_itilv3.pdf ITIL Security Management]]]
[[Image:Itil-security-management.jpg|right|thumb|500px|alt=Information Security Management ITIL|link=https://wiki.en.it-processmaps.com/index.php/File:Itil-security-management.jpg|[https://wiki.en.it-processmaps.com/images/pdf/process_overview_it_security_management_itilv3.pdf ITIL Security Management]]]


The process has been updated to account for new information security concerns.
The process has been updated to account for new information security concerns.
Line 45: Line 52:
ITIL does not provide a detailed explanation of all aspects of Information Security Management, as there are dedicated and more detailed standards available (see, for example, ISO 27001). Rather, ITIL highlights the most important activities and assists in identifying interfaces with other Service Management processes.
ITIL does not provide a detailed explanation of all aspects of Information Security Management, as there are dedicated and more detailed standards available (see, for example, ISO 27001). Rather, ITIL highlights the most important activities and assists in identifying interfaces with other Service Management processes.


Following the introduction of Design Coordination in '''''ITIL 2011''''' the information flows have been adapted. The process overview of [[Media:Itil-security-management.jpg|ITIL Security Management (.JPG)]] shows the key information flows (see Fig. 1).
Following the introduction of Design Coordination in ITIL 2011 the information flows have been adapted. The process overview of [[Media:Itil-security-management.jpg|ITIL Security Management (.JPG)]] shows the key information flows (see fig. 1).


<p>&nbsp;</p>
[[ITIL 4]] refers to 'Information Security Management' as a [[ITIL_4#General_management_practices|general management practice]].
<p style="clear:both;">&nbsp;</p>


==Sub-Processes==
==Sub-Processes==
Line 55: Line 63:
<p><span itemprop="name" content="Security Management sub-processes:">These are the <strong class="selflink">Information Management</strong> sub-processes and their process objectives:</span>
<p><span itemprop="name" content="Security Management sub-processes:">These are the <strong class="selflink">Information Management</strong> sub-processes and their process objectives:</span>
</p>
</p>
<p>&#160;</p>
<p><b><span id="ITIL_Security_Management_Controls" itemprop="itemListElement">Design of Security Controls</span></b>
<p><b><span id="ITIL_Security_Management_Controls" itemprop="itemListElement">Design of Security Controls</span></b>
</p>
</p>
<ul><li itemprop="description">Process Objective: To design appropriate technical and organizational measures in order to ensure the confidentiality, integrity, security and availability of an organization's assets, information, data and services.
<ul><li itemprop="description">Process Objective: To design appropriate technical and organizational measures in order to ensure the confidentiality, integrity, security and availability of an organization's assets, information, data and services.
</li></ul>
</li></ul>
<p><br />
<p><b><span id="ITIL_Security_Management_Testing" itemprop="itemListElement">Security Testing</span></b>
</p><p><b><span id="ITIL_Security_Management_Testing" itemprop="itemListElement">Security Testing</span></b>
</p>
</p>
<ul><li itemprop="description">Process Objective: To make sure that all security mechanisms are subject to regular <a href="/index.php/IT_Security_Management#Test_Report" title="IT Security Management">testing</a>.
<ul><li itemprop="description">Process Objective: To make sure that all security mechanisms are subject to regular <a href="/index.php/IT_Security_Management#Test_Report" title="IT Security Management">testing</a>.
</li></ul>
</li></ul>
<p><br />
<p><b><span id="ITIL_Security_Management_Incidents" itemprop="itemListElement">Management of Security Incidents</span></b>
</p><p><b><span id="ITIL_Security_Management_Incidents" itemprop="itemListElement">Management of Security Incidents</span></b>
</p>
</p>
<ul><li itemprop="description">Process Objective: To detect and fight attacks and intrusions, and to minimize the damage incurred by security breaches.
<ul><li itemprop="description">Process Objective: To detect and fight attacks and intrusions, and to minimize the damage incurred by security breaches.
</li></ul>
</li></ul>
<p><br />
<p><b><span id="ITIL_Security_Management_Review" itemprop="itemListElement">Security Review</span></b>
</p><p><b><span id="ITIL_Security_Management_Review" itemprop="itemListElement">Security Review</span></b>
</p>
</p>
<ul><li itemprop="description">Process Objective: To review if security measures and procedures are still in line with risk perceptions from the business side, and to verify if those measures and procedures are regularly maintained and tested.
<ul><li itemprop="description">Process Objective: To review if security measures and procedures are still in line with risk perceptions from the business side, and to verify if those measures and procedures are regularly maintained and tested.
</li></ul>
</li></ul>
</div><!-- end of schema.org/ItemList --><p></html>
</div><!-- end of schema.org/ItemList --><p></html>
<p>&nbsp;</p>


==Definitions==
==Definitions==
Line 82: Line 85:
<html><div itemscope="itemscope" itemtype="https://schema.org/ItemList"><!-- define schema.org/ItemList -->
<html><div itemscope="itemscope" itemtype="https://schema.org/ItemList"><!-- define schema.org/ItemList -->
<meta itemprop="itemListOrder" content="Ascending" />
<meta itemprop="itemListOrder" content="Ascending" />
<p><span itemprop="name">The following <a href="/index.php/ITIL%20Glossary#ITIL%20Glossary%20A-Z" title="ITIL Glossary">ITIL terms and acronyms</a> (<i>information objects</i>) are used in the Security Management process to represent process outputs and inputs:</span>
<p><span itemprop="name">The following <a href="/index.php/ITIL_Glossary#ITIL_Glossary_A-Z" title="ITIL Glossary">ITIL terms and acronyms</a> (<i>information objects</i>) are used in the Security Management process to represent process outputs and inputs:</span>
</p>
</p>
<p>&#160;</p>
<p><b><span id="Availability-ITSCM-Security-Testing-Schedule" itemprop="itemListElement">Availability/ ITSCM/ Security Testing Schedule</span></b>
<p><b><span id="Availability-ITSCM-Security-Testing-Schedule" itemprop="itemListElement">Availability/ ITSCM/ Security Testing Schedule</span></b>
</p>
</p>
<ul><li itemprop="description">A schedule for the <a href="/index.php/IT_Security_Management#ITIL_Security_Management_Testing" title="IT Security Management">regular testing</a> of all availability, continuity and security mechanisms, jointly maintained by <a href="/index.php/Availability_Management" title="Availability Management">Availability</a>, <a href="/index.php/IT_Service_Continuity_Management" title="IT Service Continuity Management">IT Service Continuity</a> and <strong class="selflink">Information Security Management</strong>.
<ul><li itemprop="description">A schedule for the <a href="/index.php/IT_Security_Management#ITIL_Security_Management_Testing" title="IT Security Management">regular testing</a> of all availability, continuity and security mechanisms, jointly maintained by <a href="/index.php/Availability_Management" title="Availability Management">Availability</a>, <a href="/index.php/IT_Service_Continuity_Management" title="IT Service Continuity Management">IT Service Continuity</a> and <strong class="selflink">Information Security Management</strong>.
</li></ul>
</li></ul>
<p><br />
<p><b><span id="ITIL_Security_Management_Rules" itemprop="itemListElement">Event Filtering and Correlation Rules</span></b>
</p><p><b><span id="ITIL_Security_Management_Rules" itemprop="itemListElement">Event Filtering and Correlation Rules</span></b>
</p>
</p>
<ul><li itemprop="description">Rules and criteria used to determine if an Event is significant and to decide upon an appropriate response. Event Filtering and Correlation Rules are typically used by Event Monitoring systems. Some of those rules are defined during the Service Design stage, for example to ensure that Events are triggered when the required service availability is endangered.
<ul><li itemprop="description">Rules and criteria used to determine if an Event is significant and to decide upon an appropriate response. Event Filtering and Correlation Rules are typically used by Event Monitoring systems. Some of those rules are defined during the Service Design stage, for example to ensure that Events are triggered when the required service availability is endangered.
</li><li><i>Note: The output "Event Filtering and Correlation Rules" has been added in ITIL 2011, to emphasize that (some) Event filtering and correlation rules should be designed by Information Security Management to support the detection of security issues.</i>
</li><li><i>Note: The output "Event Filtering and Correlation Rules" has been added in ITIL 2011, to emphasize that (some) Event filtering and correlation rules should be designed by Information Security Management to support the detection of security issues.</i>
</li></ul>
</li></ul>
<p><br />
<p><b><span id="ITIL_Security_Policy" itemprop="itemListElement">Information Security Policy</span></b>
</p><p><b><span id="ITIL_Security_Policy" itemprop="itemListElement">Information Security Policy</span></b>
</p>
</p>
<ul><li itemprop="description">The Information Security Management Policy describes and communicates the organization's approach to managing information security. It includes references to more specific <a href="/index.php/IT_Security_Management#Underpinning-Information-Security-Policy" title="IT Security Management">Underpinning Information Security Policies</a> which, for example, set binding rules for the use of systems and information.
<ul><li itemprop="description">The Information Security Management Policy describes and communicates the organization's approach to managing information security. It includes references to more specific <a href="/index.php/IT_Security_Management#Underpinning-Information-Security-Policy" title="IT Security Management">Underpinning Information Security Policies</a> which, for example, set binding rules for the use of systems and information.
</li></ul>
</li></ul>
<p><br />
<p><b><span id="ITIL_Security_Report" itemprop="itemListElement">Information Security Report</span></b>
</p><p><b><span id="ITIL_Security_Report" itemprop="itemListElement">Information Security Report</span></b>
</p>
</p>
<ul><li itemprop="description">The Information Security Report provides other Service Management processes and IT Management with information related to Information Security issues.
<ul><li itemprop="description">The Information Security Report provides other Service Management processes and IT Management with information related to Information Security issues.
</li></ul>
</li></ul>
<p><br />
<p><b><span id="Security-Advisories" itemprop="itemListElement">Security Advisories</span></b>
</p><p><b><span id="Security-Advisories" itemprop="itemListElement">Security Advisories</span></b>
</p>
</p>
<ul><li itemprop="description">A list of known security vulnerabilities compiled from input by third-party product suppliers. The list contains instructions for preventive measures and for the handling of security breaches once they occur.
<ul><li itemprop="description">A list of known security vulnerabilities compiled from input by third-party product suppliers. The list contains instructions for preventive measures and for the handling of security breaches once they occur.
</li></ul>
</li></ul>
<p><br />
<p><b><span id="Security_Alert" itemprop="itemListElement">Security Alert</span></b>
</p><p><b><span id="Security_Alert" itemprop="itemListElement">Security Alert</span></b>
</p>
</p>
<ul><li itemprop="description">A warning produced by Information Security Management, typically released when outbreaks of security threats are foreseeable or already under way. The aim is to make sure that users and IT staff are able to identify any attacks and take appropriate precautions.
<ul><li itemprop="description">A warning produced by Information Security Management, typically released when outbreaks of security threats are foreseeable or already under way. The aim is to make sure that users and IT staff are able to identify any attacks and take appropriate precautions.
</li></ul>
</li></ul>
<p><br />
<p><b><span id="Security-Management-Information-System" itemprop="itemListElement">Security Management Information System (SMIS)</span></b>
</p><p><b><span id="Security-Management-Information-System" itemprop="itemListElement">Security Management Information System (SMIS)</span></b>
</p>
</p>
<ul><li itemprop="description">A virtual repository of all Information Security Management data, usually stored in multiple physical locations.
<ul><li itemprop="description">A virtual repository of all Information Security Management data, usually stored in multiple physical locations.
</li></ul>
</li></ul>
<p><br />
<p><b><span id="Test_Report" itemprop="itemListElement">Test Report</span></b>
</p><p><b><span id="Test_Report" itemprop="itemListElement">Test Report</span></b>
</p>
</p>
<ul><li itemprop="description">A Test Report provides a summary of testing and assessment activities. A Test Report is created for example during Release tests in the Service Transition stage or during tests carried out by <a href="/index.php/Availability_Management" title="Availability Management">Availability</a>, <a href="/index.php/IT_Service_Continuity_Management" title="IT Service Continuity Management">IT Service Continuity</a> or <strong class="selflink">Information Security Management</strong>.
<ul><li itemprop="description">A Test Report provides a summary of testing and assessment activities. A Test Report is created for example during Release tests in the Service Transition stage or during tests carried out by <a href="/index.php/Availability_Management" title="Availability Management">Availability</a>, <a href="/index.php/IT_Service_Continuity_Management" title="IT Service Continuity Management">IT Service Continuity</a> or <strong class="selflink">Information Security Management</strong>.
</li></ul>
</li></ul>
<p><br />
<p><b><span id="Underpinning-Information-Security-Policy" itemprop="itemListElement">Underpinning Information Security Policy</span></b>
</p><p><b><span id="Underpinning-Information-Security-Policy" itemprop="itemListElement">Underpinning Information Security Policy</span></b>
</p>
</p>
<ul><li itemprop="description">Underpinning Information Security Policies are specific policies complementing the <a href="/index.php/IT_Security_Management#ITIL_Security_Policy" title="IT Security Management">main Information Security Policy</a> by setting binding rules for the use of systems and information as well as for the use and delivery of services, with the aim of improving information security.
<ul><li itemprop="description">Underpinning Information Security Policies are specific policies complementing the <a href="/index.php/IT_Security_Management#ITIL_Security_Policy" title="IT Security Management">main Information Security Policy</a> by setting binding rules for the use of systems and information as well as for the use and delivery of services, with the aim of improving information security.
</li></ul>
</li></ul>
</div><!-- end of schema.org/ItemList --><p></html>
</div><!-- end of schema.org/ItemList --><p></html>
<p>&nbsp;</p>


==KPIs==
==KPIs==
Line 137: Line 130:
<html><ul><li><a href="https://wiki.en.it-processmaps.com/index.php/ITIL_KPIs_Service_Design#ITIL_KPIs_Information_Security_Management" title="ITIL KPIs Security Management">Key Performance Indicators (KPIs) Information Security Management</a></li></ul>
<html><ul><li><a href="https://wiki.en.it-processmaps.com/index.php/ITIL_KPIs_Service_Design#ITIL_KPIs_Information_Security_Management" title="ITIL KPIs Security Management">Key Performance Indicators (KPIs) Information Security Management</a></li></ul>
<p></html>
<p></html>
<p>&nbsp;</p>


==Roles | Responsibilities==
==Roles | Responsibilities==
Line 146: Line 138:
<p>&nbsp;</p>
<p>&nbsp;</p>


{| border="1" cellpadding="5" cellspacing="0" style="margin-left: auto; margin-right: auto; text-align:center;" valign="top"
{| class="wikitable" style="background: white;"
|-
|-
|style="vertical-align:top; text-align:center" colspan="7" style="background:#ffffdd;"| '''Responsibility Matrix: ITIL Security Management'''
|+ style="background:#013b5e; color:#ffffff; font-size: 120%" colspan="7"|'''Responsibility Matrix: ITIL Security Management'''
|-
|-
!style="background:#ffffee; width: 50%; text-align:center" | ITIL Role | Sub-Process
!style="background:#ffffee; width: 50%; text-align:center" | ITIL Role / Sub-Process
! style="background:#ffffee;" | [[IT Security Management#Information Security Manager|Information Security Manager]]
! style="background:#eeeeee;" | [[IT Security Management#Information Security Manager|Information Security Manager]]
! style="background:#ffffee;" | Service Owner[[#ITIL Security Roles|<small>[3]</small>]]
! style="background:#eeeeee;" | Service Owner[[#ITIL Security Roles|<small>[3]</small>]]
! style="background:#ffffee;" | Applications Analyst[[#ITIL Security Roles|<small>[3]</small>]]
! style="background:#eeeeee;" | Applications Analyst[[#ITIL Security Roles|<small>[3]</small>]]
! style="background:#ffffee;" | Technical Analyst[[#ITIL Security Roles|<small>[3]</small>]]
! style="background:#eeeeee;" | Technical Analyst[[#ITIL Security Roles|<small>[3]</small>]]
! style="background:#ffffee;" | IT Operator[[#ITIL Security Roles|<small>[3]</small>]]
! style="background:#eeeeee;" | IT Operator[[#ITIL Security Roles|<small>[3]</small>]]
! style="background:#ffffee;" | Facilities Manager[[#ITIL Security Roles|<small>[3]</small>]]
! style="background:#eeeeee;" | Facilities Manager[[#ITIL Security Roles|<small>[3]</small>]]
|-
|-
|style="text-align:left;" |[[#ITIL Security Management Controls|Design of Security Controls]]
|style="text-align:left;" |[[#ITIL Security Management Controls|Design of Security Controls]]
Line 191: Line 183:
|-
|-
|}
|}
<p>&nbsp;</p>


'''Remarks'''
'''Remarks'''
Line 201: Line 191:


<span id="ITIL Security Roles">[3] siehe [[ITIL Roles|&#8594; Role descriptions ...]]</span>
<span id="ITIL Security Roles">[3] siehe [[ITIL Roles|&#8594; Role descriptions ...]]</span>
<p>&nbsp;</p>


==Notes==
==Notes==
Line 239: Line 227:
   <link itemprop="citation" href="https://wiki.de.it-processmaps.com/index.php/IT_Security_Management" />
   <link itemprop="citation" href="https://wiki.de.it-processmaps.com/index.php/IT_Security_Management" />
   <link itemprop="citation" href="https://wiki.es.it-processmaps.com/index.php/ITIL_Gestion_de_la_Seguridad_de_TI" />
   <link itemprop="citation" href="https://wiki.es.it-processmaps.com/index.php/ITIL_Gestion_de_la_Seguridad_de_TI" />
   <meta itemprop="Headline" content="IT Security Management" />
   <meta itemprop="Headline" content="Information Security Management" />
   <link itemprop="isPartOf" href="https://wiki.en.it-processmaps.com/index.php/ITIL_Service_Design" />
   <link itemprop="isPartOf" href="https://wiki.en.it-processmaps.com/index.php/ITIL_Service_Design" />
   <link itemprop="primaryImageOfPage" href="https://wiki.en.it-processmaps.com/images/e/e7/Itil-security-management.jpg" />
   <link itemprop="primaryImageOfPage" href="https://wiki.en.it-processmaps.com/images/e/e7/Itil-security-management.jpg" />
  <span id="https://wiki.en.it-processmaps.com/images/e/e7/Itil-security-management.jpg" itemprop="image" itemscope itemtype="https://schema.org/ImageObject">
  <meta itemprop="caption" content="Information Security Management">
  <meta itemprop="contentUrl" content="https://wiki.en.it-processmaps.com/images/e/e7/Itil-security-management.jpg" />
  <meta itemprop="width" content="1200" />
  <meta itemprop="height" content="1200" />
  <meta itemprop="representativeOfPage" content="true"/>
  <meta itemprop="dateCreated" content="2011-09-19" />
  <meta itemprop="dateModified" content="2020-06-20" />
  <span itemprop="thumbnail" itemscope itemtype="https://schema.org/ImageObject">
    <meta itemprop="url" content="https://wiki.en.it-processmaps.com/images/thumb/e/e7/Itil-security-management.jpg/600px-Itil-security-management.jpg" />
    <meta itemprop="width" content="600" />
    <meta itemprop="height" content="600" />
  </span>
  <meta itemprop="keywords" content="Information Security Management" />
  <meta itemprop="keywords" content="ITIL Security Management" />
  </span>
   <link itemprop="author" href="https://www.linkedin.com/in/stefankempter" />
   <link itemprop="author" href="https://www.linkedin.com/in/stefankempter" />
   <meta itemprop="author" content="Stefan Kempter" />
   <meta itemprop="author" content="Stefan Kempter" />
Line 248: Line 252:


<!-- This page is assigned to the following categories: -->
<!-- This page is assigned to the following categories: -->
[[Category:ITIL V3]][[Category:ITIL 2011]][[Category:ITIL process]][[Category:Service Design|Information Security Management]][[Category:Information Security Management|!]]
[[Category:ITIL 2011]][[Category:ITIL V3]][[Category:ITIL process]][[Category:Service Design|Information Security Management]][[Category:Information Security Management|!]]
<!-- --- -->
<!-- --- -->

Revision as of 12:27, 24 July 2020

share this pageshare this page on LinkedInshare this page on Twitter
share this page
DE - ES - Information Security Managementdiese Seite auf Deutschesta página en español
DE - ES - Information Security Management


Objective: Information Security Management aims to ensure the confidentiality, integrity and availability of an organization's information, data and IT services. ITIL Security Management usually forms part of an organizational approach to security management which has a wider scope than the IT Service Provider.

Part of: Service Design

Process Owner: Information Security Manager

 

Process Description

ITIL V3 treats Information Security Management as part of the Service Design core volume, resulting in a better integration of this process into the Service Lifecycle (the previous ITIL version provided guidance on Security Management in a separate book).

Information Security Management ITIL
ITIL Security Management

The process has been updated to account for new information security concerns.

ITIL does not provide a detailed explanation of all aspects of Information Security Management, as there are dedicated and more detailed standards available (see, for example, ISO 27001). Rather, ITIL highlights the most important activities and assists in identifying interfaces with other Service Management processes.

Following the introduction of Design Coordination in ITIL 2011 the information flows have been adapted. The process overview of ITIL Security Management (.JPG) shows the key information flows (see fig. 1).

ITIL 4 refers to 'Information Security Management' as a general management practice.

 

Sub-Processes

These are the Information Management sub-processes and their process objectives:

Design of Security Controls

  • Process Objective: To design appropriate technical and organizational measures in order to ensure the confidentiality, integrity, security and availability of an organization's assets, information, data and services.

Security Testing

  • Process Objective: To make sure that all security mechanisms are subject to regular testing.

Management of Security Incidents

  • Process Objective: To detect and fight attacks and intrusions, and to minimize the damage incurred by security breaches.

Security Review

  • Process Objective: To review if security measures and procedures are still in line with risk perceptions from the business side, and to verify if those measures and procedures are regularly maintained and tested.

Definitions

The following ITIL terms and acronyms (information objects) are used in the Security Management process to represent process outputs and inputs:

Availability/ ITSCM/ Security Testing Schedule

Event Filtering and Correlation Rules

  • Rules and criteria used to determine if an Event is significant and to decide upon an appropriate response. Event Filtering and Correlation Rules are typically used by Event Monitoring systems. Some of those rules are defined during the Service Design stage, for example to ensure that Events are triggered when the required service availability is endangered.
  • Note: The output "Event Filtering and Correlation Rules" has been added in ITIL 2011, to emphasize that (some) Event filtering and correlation rules should be designed by Information Security Management to support the detection of security issues.

Information Security Policy

  • The Information Security Management Policy describes and communicates the organization's approach to managing information security. It includes references to more specific Underpinning Information Security Policies which, for example, set binding rules for the use of systems and information.

Information Security Report

  • The Information Security Report provides other Service Management processes and IT Management with information related to Information Security issues.

Security Advisories

  • A list of known security vulnerabilities compiled from input by third-party product suppliers. The list contains instructions for preventive measures and for the handling of security breaches once they occur.

Security Alert

  • A warning produced by Information Security Management, typically released when outbreaks of security threats are foreseeable or already under way. The aim is to make sure that users and IT staff are able to identify any attacks and take appropriate precautions.

Security Management Information System (SMIS)

  • A virtual repository of all Information Security Management data, usually stored in multiple physical locations.

Test Report

  • A Test Report provides a summary of testing and assessment activities. A Test Report is created for example during Release tests in the Service Transition stage or during tests carried out by Availability, IT Service Continuity or Information Security Management.

Underpinning Information Security Policy

  • Underpinning Information Security Policies are specific policies complementing the main Information Security Policy by setting binding rules for the use of systems and information as well as for the use and delivery of services, with the aim of improving information security.

KPIs

Roles | Responsibilities

Information Security Manager - Process Owner

  • The Information Security Manager is responsible for ensuring the confidentiality, integrity and availability of an organization’s assets, information, data and IT services. He is usually involved in an organizational approach to Security Management which has a wider scope than the IT service provider, and includes handling of paper, building access, phone calls etc., for the entire organization.

 

Responsibility Matrix: ITIL Security Management
ITIL Role / Sub-Process Information Security Manager Service Owner[3] Applications Analyst[3] Technical Analyst[3] IT Operator[3] Facilities Manager[3]
Design of Security Controls A[1]R[2] R R R - -
Security Testing AR - - - R R
Management of Security Incidents AR - - - - -
Security Review AR - - - - -

Remarks

[1] A: Accountable according to the RACI Model: Those who are ultimately accountable for the correct and thorough completion of the Information Security Management process.

[2] R: Responsible according to the RACI Model: Those who do the work to achieve a task within ITIL Security Management.

[3] siehe → Role descriptions ...

Notes

By:  Stefan Kempter , IT Process Maps.

 

Process Description  › Sub-Processes  › Definitions  › Roles