Basics of ISMS Governance using ISO 27014

Basics of ISMS Governance using ISO 27014

“Proper governance of information security ensures alignment of information security with business strategies and objectives, value delivery and accountability. It supports the achievement of visibility, agility, efficiency, effectiveness and compliance”

What is Information Security Governance?

Information Security Governance is the process of establishing and implementing a framework that enables an organization to manage and protect its information assets. It involves the development of policies, procedures, standards, and guidelines that guide the use, protection, and management of an organization's information resources.

  • Information security governance is the lifecycle of policies, controls and procedures to ensure information security for an organization.
  • Information security governance brings an integrated approach to overall information security.
  • It guarantees that the organization’s information security approach is consistent with the organization’s overall goals. This enables the governing body to make decisions on the organization’s strategic goals by presenting information about potential threats to information security
  • Implementing an effective information security governance program will help reduce risk, instill trust into all activities and eliminate inappropriate actions.

The goal of Information Security Governance is to ensure that an organization's information assets are protected against unauthorized access, disclosure, modification, destruction, and disruption. It provides a structured and systematic approach to managing information security risks, ensuring compliance with legal and regulatory requirements, and aligning information security with the organization's business objectives.

Information Security Governance typically includes the following elements:

  1. Information Security Policies: The development and implementation of policies that define the organization's information security requirements and expectations.
  2. Risk Management: The identification, assessment, and prioritization of information security risks, and the development of strategies to mitigate those risks.
  3. Compliance Management: Ensuring that the organization's information security policies and practices comply with legal and regulatory requirements.
  4. Information Security Awareness and Training: Developing and implementing training and awareness programs to ensure that employees are aware of their responsibilities and are knowledgeable about information security threats and risks.
  5. Incident Management: The development and implementation of processes to detect, respond to, and recover from information security incidents.

What is Governing Body?

A governing body is a collective of individuals who have the authority and responsibility to formulate policies and lead an organization’s general trajectory. The collective body is responsible for decision-making and implementation on behalf of its staff, stakeholders, and the organization.

The governing body’s primary function is to safeguard the organization’s privileges and interests, as well as those of anyone who works within the organization’s framework. This body accomplishes this by ensuring that the organization operates efficiently and is capable of achieving the aims and priorities it has committed to.

What is ISO 27014?

ISO 27014 provides guidance on concepts, objectives and processes for the governance of information security, by which organizations can evaluate, direct, monitor and communicate the information security-related processes within the organization.

ISO 27014 is a standard developed by the International Organization for Standardization (ISO) that provides guidelines for information security governance. Specifically, it focuses on the role of information security governance in supporting the overall governance of an organization.

ISO 27014 is intended to be used by senior management and other decision-makers within an organization who are responsible for the governance and management of information security. The standard provides guidance on how to establish and maintain an effective information security governance framework that supports the organization's objectives and strategies.

This standard is “designed to aid organizations in effectively managing their information security strategies.” The standard offers “directions on the principles and concepts for information security governance, from which organizations can evaluate, direct, monitor, communicate and assure information security-related practices in the organization. The eleven-page standard summarizes information technology governance standards and includes a structure of six principles and five processes. The standard views IT governance as interacting with information technology governance, all of which are components of the wider framework of organizational governance.

No alt text provided for this image

The six principles – Objectives of Information Security Governance

“Governance of information security should ensure that information security activities are comprehensive and integrated”

  • Principle 1 - Establish organization-wide information security
  • Principle 2 - Adopt a risk-based approach
  • Principle 3 - Set the direction of investment decisions
  • Principle 4 - Ensure conformance with internal and external requirements
  • Principle 5 - Foster a security-positive environment
  • Principle 6 - Review performance in relation to business outcomes and meets current and future requirements

The five processes

Information security governance processes have been developed to help organizations monitor and manage their information security efforts. Evaluate, direct and monitor form a cycle similar to Plan, Do, Check Act (PDCA)

No alt text provided for this image

The key areas addressed by ISO 27014 include:

  1. Information Security Governance Framework: The development of a governance framework that defines the roles, responsibilities, and accountabilities for information security within the organization.
  2. Strategy and Policy: The development of information security strategies and policies that align with the organization's overall objectives and risk management approach.
  3. Organization and Resources: The allocation of appropriate resources, including personnel, budget, and technology, to support information security governance.
  4. Risk Management: The implementation of a risk management process to identify, assess, and manage information security risks.
  5. Performance Measurement and Monitoring: The establishment of metrics and processes for measuring and monitoring the effectiveness of the information security governance framework.

ISO 27014 places considerable emphasis on the governance components of ISO/IEC 27001 and establishes governance objectives within this framework. It covers the incorporation of information security governance activities with other governance functions and goals

ISO 27014 is intended to be used in conjunction with other standards in the ISO/IEC 27000 series, such as ISO 27001 and ISO 27002, which provide specific guidance on the implementation of information security management systems. By providing guidance on information security governance, ISO 27014 can help organizations to ensure that their information security program is aligned with their overall business objectives and effectively managed at the highest level of the organization.

Information Security Governance is a critical component of an effective information security program. It provides a structured approach to managing information security risks and ensures that information assets are protected and managed in a consistent and systematic manner.

Mark E.S. Bernard, CISO, CIO, PSCO, Chairman, Architect, PM,

Building Sustainable & Resilient Cybersecurity Programs in America, Canada, EMEA, APAC, LATAM

1 年

The approach described by ISO 27014 does not address all the governance requirements of ISO/IEC 27001:2022 ISMS. For registration /certification purposes, companies should always comply with ISO/IEC 27001:2022 ISMS the auditable specification. I created the ISO/IEC 27001:2022 ISMS Reference Architecture to simplify the complexity of complying with 163 control points listed in ISO/IEC 27001:2022 ISMS clauses 4 to 10. ISO 27014 only identified four procedures as part of governance, however that falls short of the ISO/IEC 27001:2022 ISMS requirements that include seven procedures. Check out my ISO/IEC 27001:2022 ISMS Reference Architecture for all the detailed requirements.

  • 该图片无替代文字

要查看或添加评论,请登录

Dipen Das, CISM, CISSP, CRISC的更多文章

社区洞察