Information Security Management (ISM) ensures confidentiality, authenticity, non-repudiation, integrity, and availability of organization data and IT services. It also ensures reasonable use of organization’s information resources and appropriate management of information security risks.
Information Security Manager is the process owner of this process.
Information security is considered to be met when −
Information is observed or disclosed on only authorized persons
Information is complete, accurate and protected against unauthorized access (integrity)
Information is available and usable when required, and the systems providing the information resist attack and recover from or prevent failures (availability)
Business transaction as well information exchanges between enterprises, or with partners, can be trusted (authenticity and non-repudiation)
It is required for ISM security policies cover all areas of security, be appropriate, meet the needs of business and should include the policies shown in the following diagram −
The following diagram shows the entire process of Information Security Management (ISM) −
ISM framework involves the following key elements −
The objective of Control element is to −
Establish an organization structure to prepare, approve and implement the information security policy
Establish and control documentation
The purpose of this element is to devise and recommend the appropriate security measures, based on an understanding of the requirements of the organization.
This key element ensures that appropriate procedures, tools and controls are in place to underpin the security policy.
The objective of Evaluation element is to −
Carry out regular audits of the technical security of IT systems
Supervise and check compliance with security policy and security requirements in SLAs and OLAs
The objective of Maintain element is to −
Improve on security agreements as specified in, for example, SLAs and OLAs
Improve the implementation of security measures and controls
This key element ensures prevention from security incidents to occur. Measures such as control of access rights, authorization, identification, and authentication and access control are required for this preventive security measures to be effective.
It deals with minimizing any possible damage that may occur.
It is important to detect any security incident as soon as possible.
This measure is used to counteract any repetition of security incident.
This measure ensures damage is repaired as far as possible.