Open Group Standard
Transcript of Open Group Standard
![Page 1: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/1.jpg)
Open Group Standard
Open Information Security Management Maturity Model (O-ISM3)
![Page 2: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/2.jpg)
ii Open Group Standard (2011)
Copyright © 2011, The Open Group
All rights reserved.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by
any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of the
copyright owner.
It is fair use of this specification for implementers to use the names, labels, etc. contained within the
specification. The intent of publication of the specification is to encourage implementations of the
specification.
This specification has not been verified for avoidance of possible third-party proprietary rights. In
implementing this specification, usual procedures to ensure the respect of possible third-party intellectual
property rights should be followed.
Technical Standard
Open Information Security Management Maturity Model (O-ISM3)
ISBN: 1-931624-86-0
Document Number: C102
Published by The Open Group, February 2011.
Comments relating to the material contained in this document may be submitted to:
The Open Group
Apex Plaza
Forbury Road
Reading
Berkshire, RG1 1AX
United Kingdom
or by electronic mail to:
![Page 3: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/3.jpg)
Open Information Security Management Maturity Model (O-ISM3) iii
Contents
1 Introduction ..................................................................................................... 1
1.1 Positioning Security Management ........................................................ 1 1.2 Key Characteristics of ISM3 ................................................................. 2 1.3 Potential for Certification ..................................................................... 3 1.4 Summary ............................................................................................... 4
2 Concepts – Processes, Capability, and Maturity ............................................. 5
2.1 Defining the Key Terms ....................................................................... 5 2.1.1 Tying these Key Terms Together .......................................... 5
2.2 Capability Levels .................................................................................. 6 2.3 Maturity Levels ..................................................................................... 6
2.3.1 Maturity Levels and RoI ........................................................ 7 2.4 Processes ............................................................................................... 8
2.4.1 Levels 8 2.4.1.1 Generic Processes .................................................................. 8 2.4.1.2 Strategic-Specific Processes .................................................. 9 2.4.1.3 Tactical-Specific Processes ................................................... 9 2.4.1.4 Operational-Specific Processes ........................................... 10 2.4.2 Selecting Your Set of Processes .......................................... 10 2.4.3 Process Definition ............................................................... 11 2.4.4 Process Roles and Responsibilities ..................................... 12 2.4.5 Process Metrics Definition .................................................. 16 2.4.6 Process Metrics Specification ............................................. 17 2.4.7 Process Metrics Operational Use......................................... 19
3 ISM3 in Business Context ............................................................................. 22
3.1 Business Context................................................................................. 22 3.2 Security-in-Context Model ................................................................. 23 3.3 Operational Approach ......................................................................... 23 3.4 Operational Definitions ....................................................................... 24 3.5 ISM3 Definition – Security-in-Context .............................................. 24 3.6 Business Objectives, Security Objectives, and Security Targets ........ 24
3.6.1 Business Objectives ............................................................. 24 3.6.2 Security Objectives .............................................................. 25 3.6.3 Security Targets ................................................................... 26 3.6.4 Examples ............................................................................. 27
3.7 ISM3 Interpretation of Incidents, Success, and Failure ...................... 31
4 ISM3 Process Model ..................................................................................... 34
4.1 Security Management – ISM3 Basics ................................................. 34 4.2 Generic Processes ............................................................................... 36
4.2.1 GP-1: Knowledge Management .......................................... 36
![Page 4: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/4.jpg)
iv Open Group Standard (2011)
4.2.2 GP-2: ISMS and Business Audit ......................................... 38 4.2.3 Implementing ISM3 ............................................................ 39 4.2.3.1 GP-3: ISM Design and Evolution........................................ 39
4.3 Specific Processes – Strategic Management ....................................... 41 4.3.1 SSP-1: Report to Stakeholders ............................................ 42 4.3.2 SSP-2: Coordination ............................................................ 42 4.3.3 SSP-4: Define Division of Duties Rules ............................. 42 4.3.4 SSP-6: Allocate Resources for Information Security .......... 43
4.4 Specific Processes – Tactical Management ........................................ 44 4.4.1 TSP-1: Report to Strategic Management ............................. 44 4.4.2 TSP-2: Manage Allocated Resources .................................. 44 4.4.3 TSP-3: Define Security Targets and Security
Objectives ............................................................ 45 4.4.4 TSP-4: Service Level Management ..................................... 45 4.4.5 TSP-6: Security Architecture .............................................. 46 4.4.6 TSP-13: Insurance Management ......................................... 47 4.4.7 Personnel Security ............................................................... 47 4.4.7.1 TSP-7: Background Checks ................................................ 47 4.4.7.2 TSP-8: Personnel Security ................................................... 48 4.4.7.3 TSP-9: Security Personnel Training .................................... 49 4.4.7.4 TSP-10: Disciplinary Process .............................................. 49 4.4.7.5 TSP-11: Security Awareness ............................................... 49 4.4.8 TSP-14: Information Operations ......................................... 50
4.5 Specific Processes – Operational Management .................................. 51 4.5.1 OSP-1: Report to Tactical Management.............................. 51 4.5.2 OSP-2: Security Procurement.............................................. 51 4.5.3 Lifecycle Control ................................................................. 52 4.5.3.1 OSP-3: Inventory Management ........................................... 52 4.5.3.2 OSP-4: Information Systems IT Managed Domain
Change Control .................................................... 53 4.5.3.3 OSP-5: IT Managed Domain Patching ................................ 54 4.5.3.4 OSP-6: IT Managed Domain Clearing ................................ 54 4.5.3.5 OSP-7: IT Managed Domain Hardening ............................. 55 4.5.3.6 OSP-8: Software Development Lifecycle Control .............. 56 4.5.3.7 OSP-9: Security Measures Change Control ........................ 56 4.5.3.8 OSP-16: Segmentation and Filtering Management ............. 57 4.5.3.9 OSP-17: Malware Protection Management ......................... 58 4.5.4 Access and Environmental Control ..................................... 59 4.5.4.1 OSP-11: Access Control ...................................................... 59 4.5.4.2 OSP-12: User Registration .................................................. 60 4.5.4.3 OSP-14: Physical Environment Protection
Management ......................................................... 61 4.5.5 Availability Control ............................................................. 62 4.5.5.1 OSP-10: Backup Management ............................................ 62 4.5.5.2 OSP-15: Operations Continuity Management ..................... 63 4.5.5.3 OSP-26: Enhanced Reliability and Availability
Management ......................................................... 64 4.5.5.4 OSP-27: Archiving Management ........................................ 65 4.5.6 Testing and Auditing ........................................................... 65
![Page 5: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/5.jpg)
Open Information Security Management Maturity Model (O-ISM3) v
4.5.6.1 OSP-19: Internal Technical Audit ....................................... 65 4.5.6.2 OSP-20: Incident Emulation ............................................... 66 4.5.6.3 OSP-21: Information Quality and Compliance
Assessment ........................................................... 67 4.5.7 Monitoring ........................................................................... 68 4.5.7.1 OSP-22: Alerts Monitoring ................................................. 68 4.5.7.2 OSP-23: Internal Events Detection and Analysis ................ 69 4.5.7.3 OSP-28: External Events Detection and Analysis ............... 70 4.5.8 Incident Handling ................................................................ 71 4.5.8.1 OSP-24: Handing of Incidents and Near-incidents ............. 71 4.5.8.2 OSP-25: Forensics ............................................................... 71
5 Outsourcing ................................................................................................... 73
5.1 Introduction ......................................................................................... 73 5.2 Service Level Agreements .................................................................. 73 5.3 Guidelines ........................................................................................... 74
6 Implementing ISM3 ...................................................................................... 77
6.1 Top-Down or Bottom-Up ................................................................... 77 6.2 No One Solution Fits All .................................................................... 77 6.3 Selecting the Processes to Implement ................................................. 77 6.4 Processes Fundamental to Any ISM3 Implementation ....................... 78 6.5 Guidance on the Role of Key Groups of ISM3 Processes .................. 78 6.6 Top-Down Implementation ................................................................. 79 6.7 Bottom-Up Implementation ................................................................ 81 6.8 Examples of ISM3 Maturity Levels .................................................... 82
6.8.1 General 82 6.8.2 Strategic Management ......................................................... 82 6.8.3 Tactical Management .......................................................... 82 6.8.4 Operational Management .................................................... 83
A Index of Processes ......................................................................................... 85
B Terms and Definitions ................................................................................... 87
B.1 Processes and Document Codes ......................................................... 87 B.2 Components of Information Systems.................................................. 87 B.3 Lifecycles and IT Managed Domains ................................................. 89
C ISM3 and ISO/IEC 27000 ............................................................................. 92
![Page 6: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/6.jpg)
vi Open Group Standard (2011)
Preface
The Open Group
The Open Group is a vendor-neutral and technology-neutral consortium, whose vision of
Boundaryless Information Flow™ will enable access to integrated information within and
between enterprises based on open standards and global interoperability. The Open Group works
with customers, suppliers, consortia, and other standards bodies. Its role is to capture,
understand, and address current and emerging requirements, establish policies, and share best
practices; to facilitate interoperability, develop consensus, and evolve and integrate
specifications and Open Source technologies; to offer a comprehensive set of services to
enhance the operational efficiency of consortia; and to operate the industry's premier
certification service, including UNIX® certification.
Further information on The Open Group is available at www.opengroup.org.
The Open Group has over 15 years' experience in developing and operating certification
programs and has extensive experience developing and facilitating industry adoption of test
suites used to validate conformance to an open standard or specification.
More information is available at www.opengroup.org/certification.
The Open Group publishes a wide range of technical documentation, the main part of which is
focused on development of Technical and Product Standards and Guides, but which also
includes white papers, technical studies, branding and testing documentation, and business titles.
Full details and a catalog are available at www.opengroup.org/bookstore.
As with all live documents, Technical Standards and Specifications require revision to align with
new developments and associated international standards. To distinguish between revised
specifications which are fully backwards-compatible and those which are not:
A new Version indicates there is no change to the definitive information contained in the
previous publication of that title, but additions/extensions are included. As such, it
replaces the previous publication.
A new Issue indicates there is substantive change to the definitive information contained
in the previous publication of that title, and there may also be additions/extensions. As
such, both previous and new documents are maintained as current publications.
Readers should note that updates – in the form of Corrigenda – may apply to any publication.
This information is published at www.opengroup.org/corrigenda.
This Document
The Open Information Security Management Maturity Model (O-ISM3) is The Open Group
framework for managing information security, and wider still to managing information in the
![Page 7: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/7.jpg)
Open Information Security Management Maturity Model (O-ISM3) vii
wider context. It aims to ensure that security processes in any organization are implemented so
as to operate at a level consistent with that organization's business requirements. ISM3 is
technology-neutral. It defines a comprehensive but manageable number of information security
processes sufficient for the needs of most organizations, with the relevant security control(s)
being identified within each process as an essential subset of that process. In this respect, it is
fully compatible with the well-established ISO/IEC 27000:2009, COBIT, and ITIL standards in
this field. Additionally, as well as complementing the TOGAF model for enterprise architecture,
ISM3 defines operational metrics and their allowable variances.
Efficient business systems are driven by demand and use measurements to improve quality.
ISM3 provides a framework for building, tailoring, and operating an Information Security
Management System (ISMS). The use of metrics ensures that the management system uses
objective quantitative criteria to inform business decisions on allocating IT security resources
efficiently and responding to changes. The beneficial outcomes for information security are
lower risk and better Return on Investment (RoI).
To be effective, an organization's information security processes must be documented, measured,
and managed. ISM3 defines maturity in terms of the operation of key security processes.
Capability is defined in terms of the metrics and management practices used. ISM3 requires
security objectives and targets to be derived from business objectives, and promotes the formal
measurement of effectiveness of each security management process.
Organizations in different business sectors and countries have different business requirements
and risk tolerances. The O-ISM3 framework helps information Security Managers to evaluate
their own operating environment and to plan their security management processes so they are
consistent with and cost-effective for their organization’s business objectives.
![Page 8: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/8.jpg)
viii Open Group Standard (2011)
Trademarks
Boundaryless Information Flow™ is a trademark and ArchiMate®, Jericho Forum
®, Motif
®,
Making Standards Work®, OSF/1
®, The Open Group
®, TOGAF
®, UNIX
®, and the ``X'' device
are registered trademarks of The Open Group in the United States and other countries.
COBIT™
is a trademark of the Information Systems Audit and Control Association (ISACA) and
the IT Governance Institute (ITGI).
ITIL® is a registered trademark of the Office of Government Commerce in the United Kingdom
and other countries.
Windows® is a registered trademark of Microsoft Corporation in the United States and other
countries.
The Open Group acknowledges that there may be other brand, company, and product names
used in this document that may be covered by trademark protection and advises the reader to
verify them independently.
![Page 9: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/9.jpg)
Open Information Security Management Maturity Model (O-ISM3) ix
Acknowledgements
The Open Group would like to thank the people who contributed with work, organization, or
valuable comments to the development of this O-ISM3 standard.
Principal Author (all versions):
Vicente Aceituno, ISM3 Consortium
Contributors to v2.7x (published by The Open Group):
Chris Carlson, Boeing
Anton Chuvakin, Security Warrior Consulting
Ian Dobson, The Open Group
Phil Griffin, Griffin Consulting
Jim Hietala, The Open Group
Alex Hutton, Verizon
François Jan, Arismore
Mike Jerbic, Trusted Systems Consulting Group
Mary Ann Mezzapelle, HP
Edward Stansfeld, Audit Scotland
Special thanks to significant contributors to versions up to v2.30 (published by the ISM3
Consortium):
Alex Hutton, Riskanalys.is
Robert Kloots, CSF bv
Anup Narayanan, First Legion Consulting
Anthony B. Nelson, Estec Security
Kelly Ray, Open Compliance and Ethics Group
Arthur Richard, Kuwait Oil Company
George Spafford, Pepperweed Consulting
Edward Stansfeld, Audit Scotland (editor and principal reviewer and contributor)
K Rama Subramaniam, Valiant Technologies Pvt Ltd
![Page 10: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/10.jpg)
x Open Group Standard (2011)
Shane Wansink, Deakin University
Jeff Warren, DHS – Government of Victoria/Australia
![Page 11: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/11.jpg)
Open Information Security Management Maturity Model (O-ISM3) xi
Referenced Documents
Paradigms
Defence in Depth
Keep it Simple, Stupid
Mayfield’s Paradox
Minimum Privilege
Need to Know
Objective-Value-Activity
People, Process, and Technology
Prevention, Detection, and Response
Security by Design
Shewhart Cycle or Deming Wheel (Plan, Do, Check, Act)
Documents
The following are referenced in this O-ISM3 standard:
AS 5037:2005: Knowledge Management – A Guide; refer to: www.itgovernance.co.uk.
AS/NZS 4360:2004: Risk Management (superseded by AS/NZS ISO 31000:2009); refer
to: www.riskmanagement.com.au.
Building Security In Maturity Model (BSIMM); refer to: bsimm2.com.
BS 25999: Business Continuity; refer to: www.bsigroup.com.
Carnegie Mellon University Software Engineering Institute (SEI) Capability Maturity
Model Integration (CMMI); refer to: www.sei.cmu.edu/cmmi.
Carnegie Mellon University Software Engineering Institute (SEI) People CMM
(P-CMM); refer to: www.sei.cmu.edu/cmmi/tools/peoplecmm.
Center for Internet Security (CIS) ; refer to: www.cisecurity.org.
CLUSIF MEHARI; refer to: www.clusif.asso.fr.
COBIT Framework for IT Governance and Control, ISACA; refer to: www.isaca.org.
CRAMM; refer to: www.cramm.com.
![Page 12: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/12.jpg)
xii Open Group Standard (2011)
EBIOS; refer to: www.ssi.gouv.fr/archive/en/confidence/ebiospresentation.html.
Enterprise Security Architecture Consortium Specification (in conjunction with the NAC)
(H071), published by The Open Group, December 2004; refer to:
www.opengroup.org/bookstore/catalog/h071.htm.
Federal Enterprise Architecture (USA); refer to: www.whitehouse.gov/omb/e-gov.
HIMIS (Human Impact Management for Information Security); refer to:
isqworld.com/index.php/zones/himis.
Information Operations (JP 3-13 2006); refer to: http://information-
retrieval.info/docs/DoD-IO.html.
Information Security Governance: Towards a Framework for Action, Business Software
Alliance, 2003.
Institute for Security and Open Methodologies (ISECOM) Open Source Security Testing
Methodology Manual (OSSTMM); refer to: www.isecom.org/osstmm.
ISACA IT Audit, Assurance, Security, and Control Standards; refer to: www.isaca.org.
ISACA IS Control Professionals Standards
ISC2 CISSP; refer to: www.isc2.org.
ISO 9000:2005: Quality Management Systems – Fundamentals and Vocabulary; refer to:
www.iso.org.
ISO 9001:2000: Quality Management Systems – Requirements; refer to: www.iso.org.
ISO 15228: 2005: Textile Machinery and Accessories – Profile Reeds for Air Jet Weaving
Machines – Dimensions; refer to: www.iso.org.
ISO 15489:2001: Information and Documentation – Records Management; refer to:
www.iso.org.
ISO/IEC 12207:2008: Systems and Software Engineering – Software Lifecycle Processes;
refer to: www.iso.org.
ISO/IEC 15408:2009: Information Technology – Security Techniques – Evaluation
Criteria for IT Security; refer to: www.iso.org.
ISO/IEC 21827:2002: Information Technology – Systems Security Engineering –
Capability Maturity Model (SSE-CMM); based on Carnegie Mellon’s Software
Engineering Institute (SEI) Capability Maturity Model Integration (CMMI); see
www.sei.cmu.edu/cmmi.
ISO/IEC 24762:2008: Information Technology – Security Techniques – Guidelines for
Information and Communications Technology Disaster Recovery Services; refer to:
www.iso.org.
ISO/IEC 27000:2009: Information Technology – Security Techniques – Information
Security Management Systems – Overview and Vocabulary; refer to: www.iso.org.
![Page 13: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/13.jpg)
Open Information Security Management Maturity Model (O-ISM3) xiii
ISO/IEC 27001:2005: Information Technology – Security Techniques – Information
Security Management Systems – Requirements; refer to: www.iso.org.
ISO/IEC 27002:2005: Information Technology – Security Techniques – Code of Practice
for Information Security Management; refer to: www.iso.org.
ISO/IEC 27004:2009: Information Technology – Security techniques – Information
Security Management – Measurement; refer to: www.iso.org.
ISO/IEC 27005:2008: Information Technology – Security Techniques – Information
Security Risk Management; refer to: www.iso.org.
ISO/IEC TR 18044:2004: Information Technology – Security Techniques – Information
Security Incident Management; refer to: www.iso.org.
IT Infrastructure Library (ITIL) IT Service Management (ITSM); refer to: www.itil-itsm-
world.com.
MAP MAGERIT; refer to: www.csi.map.es/csi/pg5m20.htm.
Military Deception (JP 3-13.4); refer to: www.dtic.mil/doctrine/new_pubs/jp3_13_4.pdf.
National Security Agency (NSA); refer to: www.nsa.gov.
NIST Role-Based Access Control (RBAC); refer to: csrc.nist.gov/rbac.
NIST SP 800-30: Risk Management Guide for Information Technology Systems, July
2002; refer to: http://csrc.nist.gov/publications/nistpubs.
NIST SP 800-55: Performance Measurement Guide for Information Security, July 2008;
refer to: http://csrc.nist.gov/publications/nistpubs.
PCI-DSS (PCI Data Security Standard); refer to:
www.pcisecuritystandards.org/security_standards/pci_dss.shtml.
Project Quant; refer to: securosis.com/projectquant.
OASIS Reference Model for SOA; refer to: www.oasis-open.org.
OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation), CERT;
refer to: www.cert.org/octave.
Open Web Application Security Project (OWASP); refer to: www.owasp.org.
Operations Security (JP 3-13.3); refer to: www.dtic.mil/doctrine/new_pubs/jp3_13_3.pdf.
Risk Taxonomy Technical Standard (C081), published by The Open Group, January 2009;
refer to: www.opengroup.org/bookstore/catalog/c081.htm.
SABSA (Sherwood Applied Business Security Architecture); refer to: www.sabsa-
institute.org.
SANS; refer to: www.sans.org.
SAS70 (Statement on Auditing Standards No. 70); refer to: sas70.com.
![Page 14: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/14.jpg)
xiv Open Group Standard (2011)
Serenity Project (EU); refer to: www.serenity-project.org.
Six Sigma, Motorola; refer to: www.motorola.com/motorolauniversity.jsp.
Slave Virtual Router Redundancy Protocol (SVRRP); refer to:
www.ietf.org/rfc/rfc3768.txt.
SPSMM (Secure Programming Standards Methodology Manual); refer to:
www.isecom.org/projects/spsmm.shtml.
Standardized Information Gathering, BITS; refer to: www.sharedassessments.org.
Systems Security Engineering Capability Maturity Model (SSE-CMM); refer to:
www.sse-cmm.org.
TOGAF® 9 (G091), published by The Open Group, February 2009; refer to:
www.opengroup.org/bookstore/catalog/g091.htm.
The Survivability of Network Systems: An Empirical Analysis, Cargenie Mellon
University, 2000; refer to:
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.11.7080&rep=rep1&type=pdf.
Some of the following have provided valuable ideas for the development of this O-ISM3
standard, so are acknowledged here as influential sources, even though they may not all be
directly referenced.
AEDI CAYSER; refer to: www.aedi.es/cayser/CAYSER.asp.
American Institute of Certified Public Accountants (AICPA) Generally Accepted Privacy
Principles (GAPP); refer to: www.cica.ca.
Balanced Scorecards; refer to:
http://en.wikipedia.org/w/index.php?title=Balanced_scorecard&oldid=360259742.
Business Process Improvement; refer to:
http://en.wikipedia.org/w/index.php?title=Business_process_improvement&oldid=358941
230.
Certified Information Systems Auditor (CISA), ISACA; refer to: www.isaca.org.
Certified Information Security Manager (CISM), ISACA; refer to: www.isaca.org.
CISWG Report of the Best Practices and Metrics Teams; refer to:
www.educause.edu/ir/library/pdf/CSD3661.pdf.
Designing Secure Information Systems and Software: Critical Evaluation of the Existing
Approaches and a New Paradigm, Mikko Siponen, 2002; refer to:
http://herkules.oulu.fi/isbn9514267907/isbn9514267907.pdf.
EA 7/03: EA Guidelines for the Accreditation of Bodies Operating
Certification/Registration of Information Security Management Systems; refer to:
www.european-accreditation.org.
Events Logging Markup Language (ELML); refer to: www.ISM3.com.
![Page 15: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/15.jpg)
Open Information Security Management Maturity Model (O-ISM3) xv
Federal Information Security Management Act (USA), 2002.
IETF RFC 2119: Key Words for Use in RFCs to Indicate Requirement Levels; refer to:
www.ietf.org/rfc/rfc2119.txt.
Information Assurance Markup Language (IAML); refer to: www.ISM3.com.
Information System Security Association (ISSA) Generally Accepted Information
Security Principles (GAISP); refer to: www.issa.org.
ISO 19011:2002: Guidelines for Quality and/or Environmental Management Systems
Auditing; refer to: www.iso.org.
Mathematical Proofs of Mayfield's Paradox: A Fundamental Principle of Information
Security, University of New Haven; refer to:
www.isaca.org/Template.cfm?Section=Home&CONTENTID=17181&TEMPLATE=/Co
ntentManagement/ContentDisplay.cfm.
NIST SP 800-53: Recommended Security Controls for Federal Information Systems and
Organizations, August 1009; refer to: http://csrc.nist.gov/publications/nistpubs.
OCEG Measurement & Metrics Guide; refer to: www.oceg.org/view/mmg.
Shewhart-Deming Control Charts; refer to:
http://en.wikipedia.org/w/index.php?title=Control_chart&oldid=360041352.
Towards Maturity of Information Maturity Criteria: Six Lessons Learned from Software
Quality Criteria, Mikko Siponen, 2002.
![Page 16: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/16.jpg)
![Page 17: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/17.jpg)
Open Information Security Management Maturity Model (O-ISM3) 1
1 Introduction
1.1 Positioning Security Management
In the big-picture view of computing systems, we need information security to protect our
systems from the risk of threats which have the potential to cause damage. In the business
context, information security practitioners generally approach this need by breaking it down into
the following areas:
Risk Management: To identify and estimate levels of exposure to the likelihood of loss,
so that business managers can make informed business decisions on how to manage those
risks of loss by accepting the risk, or by mitigating it, either through investing in
appropriate internal protective measures judged sufficient to lower the potential loss to an
acceptable level, or by investing in external indemnity. The business managers’ decisions
here are captured as their Security Policy, which describes how they will manage their IT
security.
Security Controls: A business creates and maintains a corporate policy on its goals and
objectives that drive its operations, and as part of its IT-dependent operations it uses its
risk assessment results to formulate an IT Security Policy that supports and enforces its
corporate policy to protect its assets (primarily its most valuable asset – data) and assure
its operations are as secure as they need to be for the level of protection required.
Security Management: To support the selection, maintenance, and overall Security
Policy for the security controls deployed in a business enterprise. In our increasingly
connected world there is also a strong business driver to partner with other organizations,
suppliers, customers, and outworkers, and this necessitates establishing mutually agreed
security arrangements for sharing data and applications. Other aspects of security
management include audit and logging, and regulatory compliance.
An Information Security Management System (ISMS) ensures effective management of security
policies and the security measures and controls that support and enforce those policies, to cost-
effectively prevent or mitigate the effects of attacks, errors, and accidents that threaten the
intended operation of information systems and the organizational processes they support. This
Open Information Security Management Maturity Model (O-ISM3) standard focuses on the
common processes of information security, which to some extent all organizations share. ISM3
is technology-neutral, so practitioners may use whatever protection techniques are appropriate to
achieve the process objectives and outputs. Just as enterprise architecture processes define the
desired operation of information systems, security management processes define operational
metrics and their allowable variances.
![Page 18: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/18.jpg)
2 Open Group Standard (2011)
1.2 Key Characteristics of ISM3
A distinctive feature of ISM3 is that it is based on a fully process-based approach to information
security management and maturity, on the basis that every control needs a process for managing
it. It breaks information security management down into a comprehensive but manageable
number of processes, with specifically relevant security control(s) being identified within each
process as an essential subset of that process.
ISM3 defines information security management maturity in terms of the operation of an
appropriate complementary set of ISM3 information security processes.. It defines capability in
terms of the metrics and management practices used, and it requires the linking of security
objectives and targets to business objectives. Market-driven maturity levels help organizations
choose the scale of ISMS most appropriate to their needs. The maturity spectrum facilitates the
trade-off of cost, risk, and usability and enables incremental improvement, benchmarking, and
long-term targets.
While many information security management approaches see risk assessment as a necessary
first stage, and ISM3 can use it as well as any other standard in this field, it does not demand a
risk assessment-based approach. In some cases, a business may decide it is not necessary to do a
risk assessment to decide it needs a security control. For example, controls can be chosen based
on:
Common-sense
Best practices (passwords)
Learning from incidents (a better firewalls or AV, maybe)
A specifically-focused vulnerability or threat analysis
Client requirements (I don't want users from project A accessing data belonging to my
project)
The ISM3 approach offers organizations the flexibility to choose any subset of its information
security processes based on various criteria.
Compatibility with ISO 9000 Quality Management
ISM3 uses a process-based and observable metrics-based methodology to manage operational
security processes. With similarities in structure and approach to quality management methods
like ISO 9000, ISM3 requires the formal articulation of security management processes. This
standard includes a baseline ISM, and guidelines for adding processes beyond the minimal
system based upon experience of incremental impact upon information security, risk, and cost. It
also includes a description of the metrics required to operate and improve the ISMS, and a
process capability model and maturity levels that build from all this. ISM3 differs from other
security management tools because of its emphasis on the practical and the measurable, which
ensures that ISMSs can adapt without re-engineering in the face of changes to technology and
risk.
![Page 19: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/19.jpg)
Open Information Security Management Maturity Model (O-ISM3) 3
Compatibility with ISO/IEC 27000
ISM3 is compatible in many ways with the ISO/IEC 27000:2009 standard, but it uses a different
approach. ISO/IEC 27001:2005 focuses on security management as a single process for what
controls are required and in place to build an ISMS, and ISO/IEC 27002:2005 outlines a large
number of potential controls and control mechanisms from which to choose to achieve selected
control objectives using the guidance provided by ISO/IEC 27001. In contrast, the ISM3
approach is to define and measure what people do in the activities that support security; in this
respect we may consider ISO/IEC 27001 to serve an auditor's requirements, while ISM3 meets a
manager's needs.
ISM3 uses a different approach to ISO/IEC 27001. It covers this ground and in addition provides
a comprehensive framework for selecting, implementing, and managing a set of security
processes to meet measurable business goals. It breaks security management down into a number
of related activities, in which each security activity is defined as a separate process, with its own
related security control(s), documentation, inputs, outputs, metrics, and linkages to other
explicitly defined activities. In so doing it gives the personnel responsible for the operation of
each process the required clarity of understanding over its purpose, resources, and reporting to
enable them to operate it to best effect.
Compatibility with COBIT
ISM3 implementations use a management responsibilities framework consistent with the ISACA
COBIT framework model, which describes best practice in the parent field of IT service
management. COBIT provides an over-arching standard applicable to information provision, and
for the subset related to security provision, ISM3 offers a framework for security management
and the tools to break this down by process, environment, and responsibility.
Compatibility with ITIL
ITIL provides an established toolkit of process-related good practices in the specific fields of IT
service delivery and IT service management. ITIL users can use the ISM3 process orientation to
strengthen their ITIL security processes. ISM3 also has a potential use in managing outsourced
security processes; for example, Service Level Agreements (SLAs) that use an ISM3 approach to
operational metrics objectives and targets are specific and measurable (see Chapter 5).
1.3 Potential for Certification
There is potential for development of an ISM3 certification program to serve the needs of
organizations and the industry where a business case arises for demonstrating conformance to a
specific ISM3 security management level of achievement. Certification schemes could be
created for:
Specific ISM3 implementations – their maturity levels (see Section 2.3). Maturity levels
are intended to be interoperable across organizations, and to be relevant to Service Level
Agreements (SLAs) – see Chapter 5. They can also be used to certify compliance to
specified industry norms, as well as to regulatory requirements. An organization certified
![Page 20: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/20.jpg)
4 Open Group Standard (2011)
to a specific level can communicate that certification to a trading partner to give a clear
understanding of how their information security is managed.
ISM3 practitioners, to certify security management professional competence along similar
lines to the ISC2-CISSP industry-recognized qualification. This could include Manager,
Auditor, and Trainer certifications.
Development activity to create an ISM3 certification program is outside the scope of this
O-ISM3 standard. If and when sufficient business case justifies starting a new project to respond
to such a requirement, it will be announced to Open Group Security Forum members as a call for
participation, with details posted on the ISM3 public web site at
www.opengroup.org/projects/security/ism3/.
1.4 Summary
ISM3 is designed with all kinds of organization in mind. In particular, businesses, non-
governmental organizations, and enterprises that are growing or outsourcing may find ISM3
attractive. In summary, ISM3:
Provides a tool for creating ISMSs that are fully aligned with the business mission and
compliance needs
Applies to any organization regardless of size, context, and resources
Enables organizations to prioritize and optimize their investment in information security
Enables continuous improvement of ISMSs using metrics
Enables metric-driven, verifiable outsourcing of security processes
![Page 21: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/21.jpg)
Open Information Security Management Maturity Model (O-ISM3) 5
2 Concepts – Processes, Capability, and Maturity
2.1 Defining the Key Terms
This chapter explains the principal ISM3 concepts of process, capability, and maturity, and how
they relate to each other. It also introduces the role of metrics, their different types, and their
support for common management practice areas.
Process – The process is the smallest, atomic unit of the standard. Everything ISM3 does
centers around the concept of the process. Processes have capabilities and are managed
using management practices.
Capability – The metrics of a process enable its management practices and reveal its
capability. From the point of view of an auditor, a process’s metrics determine its
capability.
Maturity – Selected ISM3 processes collected together and operated at a sufficient
capability determine an organization’s information security management maturity or
simply maturity. The maturity and the capability levels can be used as a basis for
development of a certification scheme, which would be of special value to certification
authorities (auditors).
2.1.1 Tying these Key Terms Together
The table below specifies what metrics are needed for a process to achieve each capability level
and its respective mapping to management practices.
Metrics enable capability to move from a basic state to an optimized state.
Process capability is determined by the metrics the process produces. Metrics are classified by
type. There are five process capability levels: basic, defined, managed, controlled, and
optimized. Metrics are classified into seven possible types.
![Page 22: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/22.jpg)
6 Open Group Standard (2011)
Capability Level Initial Managed Defined Controlled Optimized
Management Practices
Enabled
Audit,
Certify Test Monitor Planning
Benefits
Realization Assessment Optimization
Documentation * * * * * * *
Met
ric
Ty
pe
Activity * * * * * *
Scope * * * * * *
Unavailability1 * * * * * *
Effectiveness * * * * * *
Load * * * * *
Quality * *
Efficiency *
2.2 Capability Levels
Expanding on the definition above, capability is a property of how a process is managed. From a
managerial perspective, the higher the capability, the more management practices that are
applicable, and the more robust, transparent, and self-correcting the process. From an auditor's
perspective, the capability achieved by a process depends on the documentation and the metrics
used to manage it.
Some factors that help to achieve higher capability levels are a proper distribution of
responsibilities, the resources available for the process, and the motivation, skills, accountability,
and empowerment of the personnel. (See also Section 2.4.4.)
2.3 Maturity Levels
ISM3 maturity levels are specific combinations of ISM3 processes practiced at specified
capability levels. Processes are allocated to certifiable maturity levels according to a spectrum,
from a basic ISMS to an advanced one. There is a relationship between the number of processes,
their capability, and the maturity of the ISMS. The more processes, and the higher the capability,
the higher the maturity. The key relationships behind ISM3’s maturity levels are:
Mapping (or grouping) of processes to each ISM3 maturity level
Defining a capability for each mapped process at each ISM3 maturity level
The maturity levels are designed to suit the needs of organizations with different:
Size
Resources
1 Throughout ISM3, the term ―unavailability‖ is preferred to ―availability‖ because ISM3 in concerned with measuring
and reporting unavailability.
![Page 23: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/23.jpg)
Open Information Security Management Maturity Model (O-ISM3) 7
Threats
Impact, both economic and non-financial (e.g., reputation)
Risk appetite
Economic sector
Organization types that will be covered include small and medium-sized companies,
governmental units, larger enterprises, business process outsourcers (BPOs), e-commerce
specialists, organizations and utilities that provide critical infrastructures, cloud and software-as-
a-service providers, and outsourced security providers.
2.3.1 Maturity Levels and RoI
Maturity-level design takes cost into account by favoring deployment of ISM3 processes that
give a high Return on Investment (RoI) at earlier maturity levels. In general, processes
implemented at a high capability will render a higher RoI. Note that the marginal RoI is not
linear as investment increases, and that an excessive investment in security – beyond the
assessed risk cost of loss – can give a negative return. Mayfield's Paradox and a study from
Carnegie Mellon2 shows that as security posture improves, the marginal cost of further
improvement also increases.
Figure 1: The Diminishing Returns of Increased Security Investment
2 Carnegie Mellon University: ―The Survivability of Network Systems: An Empirical Analysis‖.
![Page 24: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/24.jpg)
8 Open Group Standard (2011)
2.4 Processes
2.4.1 Levels
ISM3 identifies four levels of security management on the basis that each process level reports
to the higher one, so it is only the Strategic level that reports to the CIO. If the CIO takes a
Tactical level responsibility, this occurs seamlessly.
Strategic (Direct and Provide), which deals with broad goals, coordination, and provision
of resources
Tactical (Implement and Optimize), which deals with the design and implementation of
the ISMS, specific goals, and management of resources
Operational (Execute and Report), which deals with achieving defined goals by means of
technical processes
plus a fourth Generic level for general management.3
ISM3 defines a number of processes – defined in Chapter 4 and listed in Appendix A – which
service these levels, and are therefore grouped under these same four level types:4
Generic Processes (GP)
Strategic-Specific Processes (SSP)
Tactical-Specific Processes (TSP)
Operational-Specific Processes (OSP)
2.4.1.1 Generic Processes
Generic Processes provide the essential infrastructure for the implementation, assessment, and
improvement of ISMS processes. They comprise:
Knowledge Management to gather and share security management information across the
IMS
ISMS and Business Audit to validate compliance with internal policies and regulatory
requirements
ISM Design/Evolution to evaluate whether current processes are achieving the security
management targets that have been set
For Generic Process definitions, see Section 4.2.
3 The ISM3 approach to adopting these four levels is strongly influenced by the referenced paper ―Information Security
Governance: Towards a Framework for Action‖, Business Software Alliance, 2003. 4 ―Generic Processes‖ and ―Specific Processes‖ in ISM3 are akin to the ―Generic Practices‖ and ―Specific Practices‖ in
Carnegie Mellon’s Software Engineering Institute (SEI) Capability Maturity Model Integration (CMMI). Further
information is available at www.sei.cmu.edu/cmmi.
![Page 25: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/25.jpg)
Open Information Security Management Maturity Model (O-ISM3) 9
2.4.1.2 Strategic-Specific Processes
Strategic management is responsible for selecting and designing services to provide value within
the cost and risk parameters of the organization. Strategic management is accountable to
stakeholders for the use of resources through governance arrangements. The customers of
strategic management are therefore external and possibly internal stakeholders.
Strategic management fulfils the following specific goals and responsibilities with respect to
security:
Provides leadership and coordination of:
— Information security
— Physical security
— Workplace security (outside the scope of ISM3, because it is a cross-disciplinary (i.e.,
schools of thought) area concerned with protecting the safety, health, and welfare of
people engaged in work or employment)
— Interaction with organizational units
Reviews and improves the ISMS, including the appointment of managers and internal and
external auditors
Defines relationships with other organizations, such as partners, vendors, and contractors
Allocates resources for information security
Defines security objectives consistent with business objectives, protecting stakeholders’
interests
Defines the organizational scheme of delegation
For strategic management process definitions, see Section 4.3.
2.4.1.3 Tactical-Specific Processes
Strategic management is the customer of tactical management in respect of ISM processes.
Tactical management is accountable to strategic management for the performance of the ISMS
and for the use of resources.
Tactical management has the following specific goals and responsibilities:
Provide feedback to strategic management
Manage budget, people, and other resources allocated to information security
Define the environment for operational management:
— Security Targets and Asset Classification
— Security Architecture and Lifecycle Management
— Service Level Management (define measurement systems and metrics)
![Page 26: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/26.jpg)
10 Open Group Standard (2011)
— Insurance Management
— Personnel Security
— Information Operations
For tactical management process definitions, see Section 4.2.2.
2.4.1.4 Operational-Specific Processes
Operational management reports to the Chief Information Officer and the Information Security
Tactical Manager.
Operational management has the following specific goals and responsibilities:
Provide feedback to tactical management, including incident and metrics reports
Procure and apply allocated resources efficiently and effectively
Identify and protect assets within the lifecycle
Protect and support information systems throughout their lifecycle
Applying access management and environmental controls for users and services
Availability management (may be shared with IT Operations Availability Management
and IT Service Continuity Management)
Testing and auditing
Monitoring and management of the security measures lifecycle
Carry out processes for incident prevention, detection, and mitigation (both real-time and
following an incident)
For operational management process definitions, see Section 4.2.3.
2.4.2 Selecting Your Set of Processes
The set of processes an organization should choose to use for their ISM3 implementation
depends on its Security Policy (see Section 1.1), reconciled with the resources they have
available to invest in security controls and operate their security management function. Chapter
6 provides guidance on getting started with ISM3. Every business has a unique context and
resources. Using ISM3, each organization uses a decision-making process to take a subset from
the total hierarchy of formal processes. Processes can also run several times in an organization
under different process owners or in different IT managed domains.
ISM3 requires every information security process to have an identified process owner. A process
owner may delegate operation or maintenance of a process to another role, while retaining
responsibility and supervision for the process.
The success, performance, and capability of ISM3 processes are measured by process metrics.
Process metrics help to detect abnormal conditions in a process, give a basis for comparison, and
aid management decision-making.
![Page 27: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/27.jpg)
Open Information Security Management Maturity Model (O-ISM3) 11
Chapter 6 includes general guidance on grouping some ISM3 processes by magnitude of
investment required and the expected benefit in terms of risk reduction.
2.4.3 Process Definition
ISM3 defines a comprehensive set of the information security management processes which are
applicable to managing information security. The methodology does not take a prescriptive view
of what processes must be used, their frequency of use, or their capability. All of these are driven
by business objectives and are management decisions. In using ISM3, users must understand that
these processes represent a resource trade-off against other business interests. The methodology
gives the user a framework for making these trade-offs and explaining them to stakeholders.
The notation used for ISM3 processes describes certain fundamental properties. These include:
The level of the organization responsible for each set of processes (strategic, tactical, or
operational)
The value added by the process
Inputs to the process
Outputs of the process – these can be documents, such as policies and reports, or they can
be the result of recurring events, such as taking back-ups or analyzing log files
Secondary outputs of the process – these are outputs that are qualitative or that are inputs
from other processes; for example, the outputs of OSP-19: Internal Technical Audit are
Attack Emulation Reports, and the secondary outputs are the vulnerabilities found, which
are inputs to OSP-8: Software Development Lifecycle Control
ISM3 processes are defined using the template below. Adopted ISM3 processes must have all
fields in the template defined. The process template can also be used to implement non-ISM3
processes.
Process Process Code and Name
Description Summary of the activity performed in the process.
Value Explanation of the benefit expected from the process.
Documentation Policies, procedures, and templates. Process definitions needed to describe and perform the
process.
Inputs Inputs to the process (the list of processes that generate the inputs is shown in brackets).
Inputs in italics are obtained from sources other than documents.
Outputs Results for the process (the list of processes that use the outputs is shown in brackets).
Outputs in italics are secondary outputs.
Note I: Metrics reports should normally be available to the CIO, CEO, CSO, and a representative of the users.
![Page 28: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/28.jpg)
12 Open Group Standard (2011)
Process Process Code and Name
Metric
Descriptions
Definition of appropriate measures covering accuracy, precision, and other measurements of
output quality (fitness-for-purpose) as appropriate.
Activity, scope, load, effectiveness, unavailability, and efficiency metric descriptions are usually
not specified in every process definition as they are so similar between processes it would be repetitive to do so.
Note II: This row is a placeholder for adding rows – one row per type of metric (activity, scope,
load, effectiveness, unavailability, etc.) that is relevant to the particular implementation of each
process. The metrics used in the implementation of each process are strongly related to the capability built into the process.
Responsibilities An example of a process owner is given in this row. Note that there can be more than one instance
of the process, so every instance will have an individual process owner. Process owners can be a
person or a team, so it is possible that a collective of people acting as a team can perform the role of process owner..
The supervisor of the process is normally the process owner of a higher-level process; operational
processes are supervised by tactical managers, tactical processes are supervised by strategic managers, and strategic managers are supervised by the Board.
The auditor of the process is normally an internal or external auditor, or a quality assurance
specialist. The role of auditor is incompatible with the supervisor role, the process owner role, and
performance of any other process-related duties. Auditor independence should be safeguarded; for example, by rotation.
Note III: Some practitioners may find the RACI model from COBIT useful for documenting the
responsibilities.
Related Processes Other ISM3 processes that generate required inputs to this process.
Related Methodologies
Well-known methodologies and best practices. The methodologies mentioned may be useful for
planning, assessing, implementing, testing, monitoring, auditing, optimizing, and certifying the
process.
Table 1: ISM3 Process Template
Note IV: The process code is just an identifier. The ISM3 process model presents gaps and out-
of-numeric-order processes because of deprecated or renamed processes.
Note V: The ISM3 process definitions are included in Chapter 4. All ISM3 processes are
indexed in Appendix A.
2.4.4 Process Roles and Responsibilities
For a responsibility to be carried out properly, the person or team must be:
Accountable (have a personal stake in the outcome)5
Competent (have the appropriate knowledge and experience)
Motivated (influenced by a will to succeed)
Empowered (have resources and the freedom to take decisions and give feedback)
Division of duty rules for transparency, partitioning, supervision, rotation, and separation of
responsibilities help prevent conflicts of interest and collusions to commit and conceal
5 The term ―accountable‖ is used differently in ISM3 than in the RACI model from COBIT.
![Page 29: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/29.jpg)
Open Information Security Management Maturity Model (O-ISM3) 13
unauthorized activity, including potentially criminal activity. ISM3 provides the following
guidelines on responsibility assignment and process management:
Transparency: Responsibilities and reporting channels should be clearly defined,
documented, and communicated. In addition:
— Strategic ISM reports should be available to stakeholders and their representatives, to
the extent deemed appropriate to the laws, regulations, and governance requirements of
the organization.
— Operational ISM reports should be available to tactical and strategic ISM managers.
— Tactical ISM reports should be available to strategic ISM managers.
Partitioning: All instances of ISM processes should have one and only one process
owner. All process owners should be employees of the organization. An owner may
contract out some activities related to the process, but ownership should always be held
in-house. The process owner may formally delegate a process, but still bears responsibility
for the competency and due diligence with which it is performed.
Supervision: All ISM processes should have at least one supervisor. Stakeholder
representatives may act as supervisors of strategic ISM vision, to the extent deemed
appropriate to the laws, regulations, and governance requirements of the organization:
— Strategic ISM managers may act as supervisors of tactical ISM processes.
— Tactical ISM managers may act as supervisors of operational ISM processes.
Rotation: All sensitive processes, especially audits, should be transferred periodically to
another competent process owner, even if it is just to cover a 3-4 week holiday period. It
should be difficult or impossible to forecast who the next process owner might be.
Separation: Separation of responsibilities helps to prevent internal fraud. In combination
with transparency, separation brings accountability to business processes, making clear
who is responsible for the outcomes of the process. To ensure separation works in
practice, it will normally be necessary to designate an appropriate back-up to every
participant in the process, so that if key people are away, the system does not break down.
An appropriate distribution of responsibilities, provision of resources, and the use of ISM3
processes TSP-7 to TSP-11 help to improve personnel performance.
In describing organizational structure, the following definitions are used:
Process Owner: The person or team responsible for performance of a process.
Role: A set of responsibilities assigned to a person or a team (process owner is an
example of a role). Roles normally involve: to perform, to supervise, to audit, or being
informed about tasks.
Organizational Chart: Diagram of the responsibilities for supervision between roles.
Border: Defines the limits of the organization.
![Page 30: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/30.jpg)
14 Open Group Standard (2011)
The following roles have special importance in ISM3:
Customer: As in the ITIL definition, a customer is the role who provides resources and
sets requirements for a process and a process owner.
Strategic Management: Managers involved in the long-term alignment of IT with
business needs.
Tactical Management: Managers involved in the allocation of resources and the
configuration and management of the ISMS.
Operational Management: Managers involved in setting up, operating, and monitoring
specific processes.
The above definitions recognize that an individual can have more than one role, in relation to
different duties. For example, in a small organization, the IT manager may perform ISM duties
at strategic, tactical, and operational levels. In ISM3, the terminology is intended to indicate a
level of abstraction above the operational role, not the job title or position of an individual. Some
roles relevant to organizations are:
Stakeholder: A shareholder, owner, bond holder, non-executive board member, or other,
who has a stake in performance of the organization, but no direct role in management.
CEO (Chief Executive Officer or Managing Director): The senior executive with a
strategic role.
CIO (Chief Information Officer): Manager with a strategic role responsible for the
performance and integrity of information systems.
CSO (Chief Security Officer): Manager with a strategic role responsible for all aspects
of organizational security.
System Owner: A manager with a strategic role responsible for a business process reliant
on an information system.
User: Someone authorized to use an information system.
Information Security Officer: Manager with tactical responsibility for ISM processes.
Business Unit Managers: Senior-level manager responsible for managing a segment of
the organization to successfully achieve business goals and objectives.
Human Resources: The part of the organization that selects, hires, and manages the
professional progression of personnel.
Facilities: The part of the organization that takes care of commodities like office space,
storage, etc.
Data Custodian: Someone with an operational management role over a repository.
Systems Administrator: Someone with an operational management role over an
information system.
Authorizer: Someone permitted by the system owner to authorize system access requests.
![Page 31: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/31.jpg)
Open Information Security Management Maturity Model (O-ISM3) 15
Authority: The systems administrator of an access control system.
Auditor: Someone external to the organization checking for compliance on behalf of a
process owner or a customer.
Some committees (teams) relevant to organizations are:
Executive Security Committee: Oversees coordination between internal security and
partners security, sets the rules on trust for suppliers and vendors:
— CEO
— CIO
Security Committee: Oversees coordination between information security, security in the
workplace, physical security:
— CEO
— CIO
— CSO
— Head of Human Resources
— Facilities Manager
Information Security Committee: Oversees information security:
— CIO
— CSO
— Business Unit Managers
![Page 32: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/32.jpg)
16 Open Group Standard (2011)
As a guideline, the following related roles should be kept separate:
Incompatibility
Process Owner and Stakeholder Representative
Process Auditor & Process Owner
Incident Victim & Forensics Investigator
Incident Whistle-blower & Forensics Investigator
GP-2 Process Owner & any other Process Owner
Strategic Process Owner & Operational Process Owner (this incompatibility guarantees supervision)
Authorizer & System Administrator
OSP-19 Process Owner & any other Process Owner
Physical Access Control Process Owner & Logical Access Control Process Owner
Request Personnel & Select Personnel (to prevent nepotism)
Repository Classifier & Repository User
Information System Owner & System Administrator
Weakness Whistle-blower & Patching Management Process Owner
System Administrator & User
OSP-20 Process Owner & any other Process Owner
Repository Backup Operator & Tape Librarian
Logs Administrator & Logs Keeper
OSP-21, OSP-25 Process Owner & any other Process Owner
2.4.5 Process Metrics Definition
A metric is a quantitative measurement that can be interpreted and investigated in the context of
a series of previous or equivalent measurements. Acting on a process to improve its metrics
leads to an improvement in the value added by the process. Metrics are used to promote
improvements that increase the value added by a process. While there are many metrics
available to support information security governance (see SANS, NIST SP 800-55, and ISO/IEC
27004:2009), ISM3 focuses on the ones that are relevant to process management. Any process
metric that reflects strongly the value added by a process can be used as a Key Performance
Indicator (KPI). Process metrics can be used in Service Level Agreements (SLAs) and
underpinning contracts. Process metrics are valuable when they are used to improve the
consistency with which a process is carried out. If causes of variation are identified and the
system improved, the process metric will improve too. The improvement cycle can be used to
increase efficacy and reduce risk and cost.
Each process has a set of default metrics for each output produced. Some metrics, such as
process scope, may be exactly the same for all outputs. A default metric should be used only
when it assists the management of the process. A process is not required to produce all its default
metrics. Metrics produced are information, which carry a production cost and perhaps an
obligation to respond or report. Management must determine which metrics are cost-effective,
![Page 33: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/33.jpg)
Open Information Security Management Maturity Model (O-ISM3) 17
and it must determine what to do with the information once collected, including feeding back to
inform decisions on revising the organization’s Security Policy.
ISM3 defines the following types of metrics:
Type of Metric Description
Activity Number of outputs produced.
Statistics (mean age, time between outputs, time between input and output, etc.).
Scope Proportion of all input units covered by the process.
Proportion of all inputs sampled or tested.
Unavailability Number of interruptions to the normal operation of the process.
Frequency of interruptions to the normal operation of the process.
Statistics (mean interval between interruptions, frequency of interruptions, etc.).
Uptime of normal operation of the process.
Effectiveness Number of inputs.
Mean time between inputs.
Fraction of inputs that produce an output.
Efficiency Ratio of the number of outputs submitted to the available resources for this process in actual
use.
Ratio of the proportion of all input units covered by this process to the available resources for
this process in actual use.
Ratio of the proportion of input units sampled or tested to the available resources for this
process in actual use.
Load Proportion of resources in actual use.
Quality Accuracy, precision, or other measurements of fitness-for-purpose of the output.
Table 2: Various Types of Metric Used in ISM3
As noted above, metrics are used in the context of a series of measurements. Statistical analysis
– such as the mean, the variance, and the confidence limit – is used to determine trends, measure
quality, and show improvement.
2.4.6 Process Metrics Specification
For a metric to be fully defined, the following items must be specified:
Metric Name of the metric.
Metric Type Activity, scope, unavailability, effectiveness, load, quality, or efficiency.
Metric Description Description of what is measured.
Measurement Procedure How the metric is measured.
Measurement Frequency How often is the measurement taken.
Thresholds Estimation How the thresholds are calculated.
Thresholds Accuracy Proportion of true positives and true negatives.
Current Thresholds Current range of values considered normal for the metric.
Target Value Best possible value of the metric.
![Page 34: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/34.jpg)
18 Open Group Standard (2011)
Units Units of measurement.
Categories Name and description of every category or subdivision.
The ISM3 process model only gives the metric description. ISM3 adopters determine the nature,
frequency, and precision of measurement. However, while metrics can be compared if their
metric specifications are very similar, metrics reports are not easily compared because they are
strongly dependent on implementation issues, making benchmarking or other direct comparisons
difficult.
ISM3 metrics sustain, enhance, and enable critical management practices already present in the
organization.
Performance assessment process metrics are used to provide feedback on the performance of
management practices, including the following.
Knowledge Management
The practice of keeping records, promoting agreement, and sharing knowledge, usually based on
documentation.
Implementation
Practice performed when no operational management system or management process exists.
Implementation uses information from an assessment of the organization's goals and existing
informal management practices to design an appropriate management system or process.
Operation
The routine practice for executing a process that normally implies the following:
Testing: Assessment of whether process outputs are as expected when test data is input.
Monitoring: Checking whether the outputs of the process and the resources used are
within normal range in order to detect significant anomalies.
Improving: Making changes in the process to make it more suitable for the purpose, or to
reduce usage of resources. Removing faults before they produce incidents, bottlenecks
that hamper performance, and making trade-offs are examples of process improvements.
This management practice needs information gained from evaluating, testing, or
monitoring the process. The gains from the changes (if any) can be measured with
subsequent testing, monitoring, or evaluation.
Planning: Organizing and forecasting the amount, assignment, and milestones of tasks,
resources, budget, deliverables, and performance of a process.
Evaluation
Required periodically to assess the outcomes of the ISMS:
![Page 35: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/35.jpg)
Open Information Security Management Maturity Model (O-ISM3) 19
Assessment:
— How well the process matches the organization's needs and compliance goals
expressed as security objectives
— How changes in the environment or management decisions in a process change the
quality, performance, and use of resources of the process
— Whether bottlenecks or single points of failure exist
— Points of diminishing returns
— Benchmarking of processes between process instances and other organizations
— Trends in quality, performance, and efficiency
Audit: Checks are made on whether the process inputs, activities, and results match their
documentation.
Certify: Certification evaluates whether process documentation, inputs, outputs, and
activities comply with a predefined standard, law, or regulation. The certificate provides
independent proof of compliance that third parties can trust.
Benefits Realization: Shows how achieving security objectives contributes to achieving
business objectives, measures the value of the process for the organization, or justifies the
use of resources.
2.4.7 Process Metrics Operational Use
There are five steps in the use of metrics: measurement, interpretation, investigation,
representation, and diagnosis, as follows.
Measurement
The measurement of the current value of the metric is periodic and normally refers to a window;
for example: ―9:00pm Sunday reading of the number of viruses cleaned in the week since the
last reading‖. Measurements from different sources and different periods need to be normalized
before integration in a single metric.
Interpretation
The meaning of a measured value is evaluated comparing the value of a measurement with a
threshold, comparable measurement, or target. Normal values (those within thresholds) are
estimated from historic or comparable data.
The results of interpretation are:
Anomaly: When the measurement is beyond acceptable thresholds.
Success: When the measurement compares favorably with the target.
Trend: General direction of successive measurements relative to the target.
![Page 36: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/36.jpg)
20 Open Group Standard (2011)
Benchmark: Relative position of the measurement or the trend with peers.
Incidents or poor performance take process metrics outside normal thresholds. Shewhart-
Deming control charts are useful to indicate whether the metric value is within the normal range,
as values within the arithmetic mean plus/minus twice the standard deviation make more than
95.4% of the values of a normally distributed population. Fluctuations within the ―normal‖ range
would not normally be investigated.
Investigation
The investigation of abnormal measurements ideally ends with identification of the common
cause; for example, changes in the environment or results of management decisions, or a special
cause (error, attack, accident) for the current value of the metric.
Representation
Proper visualization of the metric is key for reliable interpretation. Metrics representation will
vary depending on the type of comparison and distribution of a resource. Bar charts, pie charts,
and line charts are most commonly used. Colors may help to highlight the meaning of a metric,
such as the green-amber-red (equivalent to on-track, at risk, and alert) traffic-light scale. Units,
the period represented, and the period used to calculate the thresholds must always be given for
the metric to be clearly understood. Rolling averages may be used to help identify trends.
Diagnosis
Managers should use the results of the previous steps to diagnose the situation and analyze
alternatives and their consequences, to arrive at appropriate business decisions.
Fault in Plan-Do-Check-Act cycle leading to repetitive failures in a process: Fix the
process.
Weakness resulting from lack of transparency, partitioning, supervision, rotation, or
separation of responsibilities (TPSRSR): Fix the assignment of responsibilities.
Technology failure to perform as expected: Change or adapt the technology.
Inadequate resources: Increase resources or adjust security targets.
Security target too high: Revise the security target if the effect on the business would be
acceptable.
Incompetence, dereliction of duty: Take disciplinary action.
Inadequate training: Institute immediate and/or long-term training of personnel.
Environment change: Make improvement to adapt the process to the new conditions.
Previous management decision: Check if the results of the decision were sought or
unintended.
Error: Fix the cause of the error.
![Page 37: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/37.jpg)
Open Information Security Management Maturity Model (O-ISM3) 21
Attack: Evaluate whether the protection against the attack can be improved.
Accident: Evaluate whether the protection against the accident can be improved.
![Page 38: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/38.jpg)
22 Open Group Standard (2011)
3 ISM3 in Business Context
3.1 Business Context
ISM3 is a framework for managing information security in the context of business objectives.
The ISM3 practitioner analyzes the impact of information security on achieving business
objectives and makes this analysis visible to management through the development of security
objectives and targets. This analysis forms the basis for documenting Security Policy for the
organization.
While the agreed objectives describe intent, security targets describe tolerance for deviation. For
critical objectives, the tolerance of deviation in related security targets is likely to be very low.
For aspirational objectives, targets with a wide tolerance can be set. While incidents are any
occasion of an objective not being met, only deviation from a security target gives rise to a
security management failure. ISM3 processes provide the means of managing information
security.
An organization using ISM3 recognizes that there is a trade-off between information security
and other business interests, and requires business and security management to work together.
When ISM3 is implemented correctly, management works collaboratively towards the same
goals, with less friction between the security function and other business units.
ISM3 provides an objective and measurable framework for managing information security. All
objectives and security targets are expressed in tangible, specific, and measurable terms from
which management is able unambiguously to conclude whether the security management system
is succeeding or failing.
Security managers face a difficult challenge in justifying their security decisions to stakeholders.
If there are no security incidents, stakeholders may feel there is over-investment in security. If
there is a serious incident, a review might suggest that the Security Manager’s assessment of a
particular area of risk was wrong. Security Managers stand to take the blame for security
breaches, while success is measured as ―no significant security breaches‖ so goes unrecognized.
The root of this challenge is a lack of clarity and agreement over what security means in
practice. ISM3 addresses this by using operational definitions of security. Instead of conceptual
definitions of important terms, such as confidentiality, availability, and integrity, ISM3 uses
operational definitions, which say how they may be achieved. This means there is a need for
dialog between the Security Manager and their business managers to work out what matters
(business and security objectives), how they should be measured (security targets), and the
escalation threshold for declaring a major problem (an ISMS failure).
![Page 39: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/39.jpg)
Open Information Security Management Maturity Model (O-ISM3) 23
3.2 Security-in-Context Model
The ISM3 security-in-context model gives the Security Manager a methodology to translate the
business outcomes for security into the technical specifications of the security system. The
overall structure of the security-in-context model, explained in detail in the subsequent sections
in this chapter, is described in the figure below:
Figure 2: ISM3 Security-in-Context Model
3.3 Operational Approach
ISM3’s operational approach defines an incident as a failure to achieve one or more of
management’s agreed business and security objectives. An ISMS failure occurs when a security
target is breached. A state of security exists when all objectives are continually met within their
security target tolerances in spite of threats.
When business objectives and security objectives are aligned, information security becomes a
key contributor to the common goal of achieving the business objectives. The progress towards
better security is measurable in terms of increasing predictability of achieving the security
objectives. The alignment also assists in the resolution of resource trade-offs, where decisions
are taken over whether to invest in security at the expense of other parts of the business.
Investment is less likely to be driven by the most recent incident or threat. There is recognition
that security is not invulnerability to all attacks, but rather is an economically efficient level of
invulnerability given competing claims upon business resources.
![Page 40: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/40.jpg)
24 Open Group Standard (2011)
3.4 Operational Definitions
ISM3 aims to ease communication between security, IT, and business managers, Therefore, in
creating security objectives and targets, operational terms and measures are used where possible.
ISM3 avoids traditional security concepts, such as confidentiality, availability, and integrity,
because there is a temptation to use them as shorthand, and that leads to misunderstanding.
While security targets are necessarily specific and detailed, the use of operational terms helps to
remove ambiguity and the potential for misunderstanding. As an example, instead of a general
security objective like ―maintaining the confidentiality of information‖, ISM3 states how
confidentiality is achieved in operational terms, such as physical and logical access control, user
enrolment, and audit trail. An example of an operational definition in this context would be:
―Use of services, information repositories, and systems is restricted to authorized users.‖.
Terms used in ISM3 are described in Appendix B. This includes the component-based model
used by ISM3 to describe in plain terms the key elements of IT architecture.
3.5 ISM3 Definition – Security-in-Context
ISM3 defines security as ―the result of continuously meeting or exceeding a set of objectives‖.
Because business objectives differ between organizations, the security-in-context approach
makes security in ISM3 context-dependent.
Traditionally, to be secure means to be invulnerable (resilient to any possible attack). Using
security-in-context, to be secure means to be reliable, in spite of attacks, accidents, and errors.
Traditionally, an incident is any loss of the abstract information properties of confidentiality,
availability, or integrity. Under security-in-context, an incident is a failure to meet the
organization’s objectives, which are expressed as business objectives and security objectives.
This definition implies that an event, which is classified as an incident at one organization, may
not be classified as an incident at another. For example, an organization, or an IT managed
domain that handles no secret information, may not classify the viewing of its files by an
unauthorized party as an incident.
ISM3 focuses on achieving business and security objectives. Protection of assets is important
insofar as it furthers the achievement of security objectives.
3.6 Business Objectives, Security Objectives, and Security Targets
3.6.1 Business Objectives
Every organization exists for specific purposes that require it to set goals and meet certain
obligations. Business objectives, ranging from aspirational goals to regulatory compliance, may
originate internally, or be imposed by an external party such as the government. Their
achievement depends on many factors, one being information security. Every business objective
in ISM3 is operationally defined.
![Page 41: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/41.jpg)
Open Information Security Management Maturity Model (O-ISM3) 25
Some examples of business objectives are:
Paying the payroll on the 1st of every month
Paying all incoming invoices within a certain timeframe
Paying taxes on time
Delivering the products and services when and where committed by the organization
Keeping all necessary records to pass any audit successfully (i.e., tax audit, software
license audit, etc.)
Preventing breach of contractual agreements
Protecting intellectual property and legal rights
Invoicing all products and services provided
3.6.2 Security Objectives
ISM3 documents the contribution of information security towards meeting business objectives
through using a dependency analysis. The output of the dependency analysis is a list of security
objectives that form the basis for design, implementation, and monitoring of the ISMS. They
also form the business objectives for the security component when planning enterprise
architecture. Security objectives, derived from business objectives, state explicitly how
information security contributes to business objectives.
Some examples of security objectives derived from the business objective ―Invoicing all
products and services provided‖ are:
Invoices are accessible only to the Accountancy and Collection teams.
Paid invoices are kept for three years and destroyed after no more than four years.
The system registers the user name, date, and time every time an invoice is created.
The system is available 9 to 5 Monday to Friday, with no more than five interruptions per
week, with a duration of no more than one hour in total, and causing delay to billing of no
more than 15 invoices.
Fewer than five errors per hundred invoices.
More than 99.8% of products served are invoiced.
The license for the system is up-to-date.
Personal information held in the invoicing system is registered at the Data Protection
agency and held appropriately.
The system is not visible to systems outside the company.
The system is hosted internally in the data center under controlled environmental
conditions that provide reasonable safeguards against fire, flood, etc.
![Page 42: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/42.jpg)
26 Open Group Standard (2011)
ISM3 defines five categories of security objectives:
Priority Security Objectives determine what availability means for the business.
Examples are backup and identification of single points of failure. Resources are allocated
according to the priority of protected services, interfaces, and channels. In a multi-tiered
information system, the priority of user-facing services is propagated to the lower-level
services they depend on.
Durability Security Objectives relate to the generic term integrity and include the
planned retention and destruction of information in accordance with policy and business
objectives. Durability objectives are supported by archiving and secure disposal
techniques.
Information Quality Objectives also relate to integrity and include precision (or
accuracy), relevance (how up-to-date information is), completeness, and consistency of
repositories. Information quality objectives usually rely upon quality control techniques,
but may also include access control, accountability, authorization, and audit techniques as
well. The information quality of a repository is a measure of its fitness in fulfilling
security objectives.
Access Control Objectives ensure that the business requirements for confidentiality of
protected information (e.g., secrets, personal information, licensed, copyrighted, patented,
and trademarked information) are clearly understood by the business. Access control
requires the identification and management of authorized users, and typically includes
enrolment, role management, segregation, accountability, authorization, and logging
techniques for its implementation and control.
Technical Security Objectives cover the underlying architecture of information systems,
and are a step remote from direct impact on the business. Technical security objectives
typically include operational objectives for the data center’s safety, reliability, power, as
well as the IT managed domain, including software patching and upgrading, maintenance
processes, and vulnerability management and resilience to compromise and misuse.
Technical security objectives usually depend upon data center infrastructure, technologies
such as firewalls, anti-virus, intrusion detection and prevention, and processes such as
patch management and secure configuration. Failure to meet technical security objectives
puts all other (business and security) objectives at risk, but does not necessarily create a
business objective failure itself.
3.6.3 Security Targets
As well as expressing security objectives in terms of what matters to the business, ISM3 defines
the tolerable deviations. All ISM3 objectives (business and security) must include their security
target. This is the maximum deviation from the desired outcome that management tolerates
before taking corrective action. ISM3 can support any specified variance. This enables the ISM3
program to support and manage both aspirational objectives (whose allowable deviations may be
very high) and critical objectives (where there is usually a very narrow compliance range).
Security targets are normally defined in terms of frequency of occurrence and threshold cost, as
the allowable business impact of failing to meet objectives reflects the trade-off against other
priorities and objectives. Security targets show what the organization expects for its information
![Page 43: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/43.jpg)
Open Information Security Management Maturity Model (O-ISM3) 27
security investment. Put another way, management’s act of defining security targets also
specifies its risk appetite, or the variance tolerance of its objectives.
Security objectives and their targets may vary between IT managed domains (subdivisions of a
logical, technical, or organizational partition under a single management), geographic locations,
or business units depending on local context, specific protection requirements, cost structures,
and use of technology. The threshold values set for each security target may be different for
each. This allows a tighter set of targets to be established for more sensitive IT managed
domains and helps to ensure that the ISMS is tailored to the needs of each IT managed domain in
an organization. Similarly, different organizations in the same sector are likely to have different
security objectives. As a result, a statement of security objectives must be created and
maintained for each IT managed domain of the organization.
3.6.4 Examples
The tables in this section offer examples of business objectives and security objectives for
priority security, information quality, access control, and technical issues, and their related
security targets. These are only examples, provided here to clarify the concepts. ISM3
practitioners must define for themselves each ISM3 managed business objective, its dependent
security objectives, and security targets. Note that business objectives include internal and
external (compliance) objectives.
Sample Business Objectives Sample Security Targets
Paying the payroll on the 1st of every month. Less than one failure per two years.
Paying taxes on time. Less than one failure per ten years.
Penalties of less than 0.1% of the accounting value of the company.
Invoice all products and services provided. Fewer than ten incidents per year.
Loss is less than 0.1% of the accounting value of the company.
Deliver the products and services when and
where committed by the organization.
Fewer than ten incidents per year.
Loss is less than 0.1% of the accounting value of the company.
Online booking availability. Fewer than five incidents every year where online booking is
unavailable for one hour or more between 0800 and 1700 hours or simultaneous users are reduced to 50 or less.
Loss is less than 0.1% of the accounting value of the company.
Online booking reliability. Fewer than two incidents where interruptions are more than two or add up to more than 15 minutes any working day.
Loss is less than 0.1% of the accounting value of the company.
Online booking volatility. Fewer than two incidents per month where more than five minutes of transactions are lost because of a service interruption.
Loss is less than 0.1% of the accounting value of the company.
Tax information retention. Less than one incident every year where more than 1% of data
with a five years’ retention requirement is lost.
Loss is less than 0.1% of the accounting value of the company.
Old customers information expiry. Fewer than two incidents every year where more than 1% of
expired data is recoverable.
Loss is less than 0.1% of the accounting value of the company.
![Page 44: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/44.jpg)
28 Open Group Standard (2011)
Sample Business Objectives Sample Security Targets
Precision of customer addresses. Fewer than two incidents every year where more than 0.5% of
customer addresses are wrong or outdated any working day.
Loss is less than 0.1% of the accounting value of the company.
Third-party services and repositories appropriately licensed.
Fewer than ten incidents every year where an improperly licensed service or repository is used.
Loss is less than 0.1% of the accounting value of the company.
Personal information collected proportional to its use.
Fewer than two incidents every year where personal data is collected without a business purpose.
Loss is less than 0.1% of the accounting value of the company.
Personal information held for no longer than
required.
Fewer than two incidents every year where more than 0.1% of
personal records are retained beyond their expiry date.
Loss is less than 0.1% of the accounting value of the company.
Tax records kept for a minimum number of
years.
Fewer than two incidents every year where more than 0,1% of tax
records are lost.
Loss is less than 0.1% of the accounting value of the company.
Personal information is protected using the
mandated security measures.
Fewer than five incidents every year where mandatory security
measures are found to be missing.
Loss is less than 0.1% of the accounting value of the company.
Owner of personal information agrees for it to be
collected, and has the right to check it and fix it and approve how it will be used.
Fewer than ten incidents every year where a personal record is not
handled appropriately.
Loss is less than 0.1% of the accounting value of the company.
Repositories with personal information registered
with the Data Protection agency.
Less than one incident every two years where a repository is not
registered.
Loss is less than 0.1% of the accounting value of the company.
Priority Security Objectives Sample Priority Security Targets
Availability: The period of time when a service,
repository, interface, or channel must exist, be
accessible, and usable (perform according to
customer needs) upon demand according to or exceeding customer needs.
Nine hours per day every working day between 0800 and 1700 hours for ten years serving 100 simultaneous users.
Loss is less than 0.1% of the accounting value of the company.
Reliability: The longest time and number of
times in the availability (performance) time a
service, repository, interface, or channel can be
interrupted according to or exceeding customer needs.
Two times for a total time of 15 minutes per day during working
hours.
Loss is less than 0.1% of the accounting value of the company.
Volatility: The oldest recent messages and
information that can be lost because of an
interruption of service, channel, or interface according to or exceeding customer needs.
1,000 transactions lost per interruption.
Five minutes of information and transactions per interruption.
Loss is less than 0.1% of the accounting value of the company.
![Page 45: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/45.jpg)
Open Information Security Management Maturity Model (O-ISM3) 29
Durability Security Objectives Sample Durability Security Targets
Retention Period: The minimum length of time a
repository is kept (preserved) according to or exceeding customer and regulatory requirements.
Five years since creation.
Loss is less than 0.1% of the accounting value of the company.
Expiry: The date the expired or end of lifecycle
repositories and records should be permanently
and reliably destroyed according to or exceeding
customer and regulatory requirements. Those
with personal information of customers and employees often require a specific expiry date.
10 years since end of use.
Loss is less than 0.1% of the accounting value of the company.
Information Quality Security Objectives Sample Information Quality Security Targets
Completeness: The extent to which a repository
is populated (available and consistent) with the
information required to meet or exceed customer
needs. The lower limit is usually set by business
or customer needs, and the upper limit by regulatory needs.
98% of subscriber lines installed are in the invoicing database.
Loss is less than 0.1% of the accounting value of the company.
Personal information completeness must be
proportional to its use.
Fewer than 20 incidents every year.
Loss is less than 0.1% of the accounting value of the company.
The owner of personal information must agree
for it to be collected and has the right to check it, fix it, and approve how it will be used or ceded.
Fewer than 20 incidents every year.
Loss is less than 0.1% of the accounting value of the company.
The owner of personal information will be given
notice when personal data is collected, including who is collecting the data.
Fewer than 20 incidents every year.
Loss is less than 0.1% of the accounting value of the company.
Personal information must be used for the
purpose agreed with the information owner.
Fewer than five incidents every year.
Loss is less than 0.1% of the accounting value of the company.
Personal information must not be disclosed without the agreement of the information subject.
Fewer than five incidents every year.
Loss is less than 0.1% of the accounting value of the company.
Personal information owners will have means to
make data collectors accountable for their use of
personal information.
Fewer than five incidents every year.
Loss is less than 0.1% of the accounting value of the company.
Access Control Security Objectives Sample Access Control Security Targets
Granting the use of services and interfaces and access to repositories to authorized users.
Fewer than 25 incidents per year.
Loss is less than 0.1% of the accounting value of the company.
Denying the use of services and interfaces and access to repositories to unauthorized users.
Fewer than 10 incidents per year.
Loss is less than 0.1% of the accounting value of the company.
Express the will and intent about a repository of the owner of a user account or certificate.
Fewer than 20 incidents per year.
Loss is less than 0.1% of the accounting value of the company.
![Page 46: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/46.jpg)
30 Open Group Standard (2011)
Access Control Security Objectives Sample Access Control Security Targets
Accurate recording of:
Interface ID and location
User account or certificate ID
Signature
Type of access attempt
Date and time of access attempt
Access attempt result
Repository, interface, service, or
message accessed
Fewer than 10 incidents per year.
Loss is less than 0.1% of the accounting value of the company.
Personal information is accessible to authorized
users only and is held for no longer than
required.
Fewer than 20 incidents per year.
Loss is less than 0.1% of the accounting value of the company.
Secrets are accessible to authorized users only. Fewer than three incidents per year.
Loss is less than 0.1% of the accounting value of the company.
Third-party services and repositories are
appropriately licensed and accessible only to authorized users.
Fewer than five incidents per year.
Loss is less than 0.1% of the accounting value of the company.
Information systems are physically accessible
only to authorized users.
Fewer than five incidents per year.
Loss is less than 0.1% of the accounting value of the company.
Repositories are accessed by authorized users
only.
Fewer than 10 incidents per year.
Loss is less than 0.1% of the accounting value of the company.
Technical Security Objectives Sample Technical Security Targets
Systems are as free of weaknesses as possible. Average update level in the production IT domain within one week
or less.
Systems that need to be visible to not trusted systems are the least visible possible.
Less than 10 unused ports discovered during penetration testing per year.
Systems run trusted services only. The medium update level of antivirus is below one day.
The electricity, temperature, and humidity where systems operate exceed the systems needs.
Electricity reliability is over 99,9999%.
Temperature doesn't exceed 25 degrees for more than five minutes
a day.
Humidity exceeds upper limit of 80% for less than 10 minutes a
day.
TIP: The following list of questions can help to investigate security objectives and targets of a
system:
System Access
Who are the users of the system?
Do they need to be specifically authorized?
![Page 47: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/47.jpg)
Open Information Security Management Maturity Model (O-ISM3) 31
From whom do we want to protect the system’s information?
Will any part of the system be located in publicly accessible locations?
System Compliance
Will the system handle personal information of clients, potential clients, stockholders, or
employees?
If parts of the system are installed in different locations, which parts are subject to
different regulations in terms of handling of personal information and data breach
disclosure?
Will the system use licensed information from third parties?
If parts of the system are installed in different locations, which of those parts are subject to
different licensed information regulations?
Will the system handle intellectual property?
If parts of the system are installed in different locations, which of those parts are subject to
different intellectual property regulations?
System Operation Quality
When should the system be performing normally (e.g., 8 hours per day for the 5 working
days of the week, or 24x7, etc.)?
How many interruptions are acceptable?
What would be the longest acceptable interruption?
What is the maximum number of transactions that can be lost because of an interruption?
For how long will the system’s data be archived?
If the data needs to be deleted, when should this happen?
What is the maximum acceptable percentage of records with wrong information?
What is the maximum percentage of records that can be missing?
3.7 ISM3 Interpretation of Incidents, Success, and Failure
ISM3 uses business and security objectives and security targets as the criteria to determine both
the occurrence of incidents and the overall success of an ISM. An incident is recognized every
time a business or security objective is not met. Determining an incident’s impact upon business
objectives should include both direct and indirect impacts:
Direct impact:
— Lost sales or service penalties
![Page 48: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/48.jpg)
32 Open Group Standard (2011)
— Cost to return the system to the pre-incident state, including re-creation of the
information
— Cost of maintaining business-as-usual during the incident
— Property damage and loss
— Others, such as financial penalties, higher insurance premiums, liability in the event of
litigation
Indirect impact:
— Damage to image, brand, or reputation
— Capital impairment, perhaps in the form of lost goodwill
— Loss of trust
— Treasury/cashflow implications
— Breach of contract, statutory, or regulatory legal obligations
— Breach of ethical codes of conduct
— Breach of social and moral obligations
— Breach of professional, regulatory, or statutory responsibilities
The occurrence of an incident, however, does not by itself mean that the ISMS has failed. ISM3
defines success as the achievement of the security target relating to that objective, not whether
an incident has or has not occurred. Meeting all security targets throughout the year, for
example, would mean that the ISMS has been successful for that entire year, regardless of any
incidents that occurred during that period.
ISM3 defines failure as the opposite of success; that is, one or more business targets or security
targets were not met. There are two failure modes relevant to managing information security:
1. Failure to meet a security target of a security objective.
All failures of this type are failures of the ISMS, regardless of whether business objectives
were met in spite of the failure. Failure to meet this category of security target puts the
success of achieving a business objective at risk of failure as described in the dependency
analysis.
2. Failure to meet a security target of a business objective.
Not all failures of this type are failures of information security management. Failures to
meet the security target or business objectives require further analysis to determine
whether information security was the root cause of missing the target. When information
security played no part in failing to achieve the business objective, there was no failure of
the ISMS. However, if information security was the cause, then business and security
management must review and revise the dependency analysis to reflect new knowledge of
how success in achieving business objectives depends upon information security
![Page 49: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/49.jpg)
Open Information Security Management Maturity Model (O-ISM3) 33
management. They must also revise security objectives and targets based upon this
knowledge, and adapt the ISMS itself to achieve the new security targets predictably.
![Page 50: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/50.jpg)
34 Open Group Standard (2011)
4 ISM3 Process Model
In the ISM3 context, security is the result of a process. The better the security process, the better
the protection achieved from the resources available.
Using our security-in-context model, an incident is defined as a failure to meet the
organization’s business or security objectives. Since the definition is context-dependent, ISM3
does not consider any single set of security measures or security management processes as
compulsory or even useful for all organizations.
Note VI: As noted in Chapter 2, ―Generic Processes‖ and ―Specific Processes‖ in ISM3 are akin
to the ―Generic Practices‖ and ―Specific Practices‖ in Carnegie Mellon’s Software Engineering
Institute (SEI) Capability Maturity Model Integration6 (CMMI – see www.sei.cmu.edu/cmmi).
ISM3 prefers to use the term ―process‖ but acknowledges this prior work, which should be
interpreted as follows:
Management Practices: Things you do to manage processes.
Generic Processes: Processes you perform to achieve Generic Goals.
Specific Processes: Processes you perform to achieve Specific Goals which, in turn,
contribute to achieving Generic Goals – see Figure 3.
Use of the term ―practice‖ in the following definitions should be interpreted in this context.
4.1 Security Management – ISM3 Basics
To manage something means to define and achieve goals, while optimizing the use of resources.
Management activities normally include the requirements to plan, direct, control, and coordinate.
ISM3 identifies three levels of security management:
Strategic (Direct and Provide), which deals with broad goals, coordination, and provision
of resources
Tactical (Implement and Optimize), which deals with the design and implementation of
the ISMS, specific goals, and management of resources
Operational (Execute and Report), which deals with achieving defined goals by means of
technical processes
6 ISO/IEC 21827:2002: Information Technology – Systems Security Engineering – Capability Maturity Model (SSE-
CMM). There is some overlap between ISM3 and SSE-CMM.
![Page 51: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/51.jpg)
Open Information Security Management Maturity Model (O-ISM3) 35
Figure 3: ISM3 Security Management Levels
The generic goals of an ISMS are to:
Prevent and mitigate incidents that could jeopardize the organization’s property and the
output of products and services that rely on information systems
Optimize the use of information, money, people, time, and infrastructure
The outputs of an ISMS are:
Incident prevention
Incident mitigation
Risk reduction
Trust
The better the processes for assuring these goals and outcomes, the better will be the results in
achieving the business and security objectives for the system.
Generic Processes provide the essential infrastructure for the implementation, assessment, and
improvement of ISMS processes. These are described in more detail in the following section.
The Operational level reports to the Tactical level, which in turn reports to the Strategic level,
which in turn reports to the organization's stakeholders:
Strategic ISM reports should be available to stakeholders and their representatives, to the
extent deemed appropriate to the laws, regulations, and governance requirements of the
organization.
Operational ISM reports should be available to tactical and strategic ISM managers.
Tactical ISM reports should be available to strategic ISM managers.
![Page 52: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/52.jpg)
36 Open Group Standard (2011)
Figure 4: ISM3 Security Management Levels Reporting Structure
In small to medium-sized enterprises (SMEs) it is possible that the three levels – Strategic,
Tactical, Operational – may be compressed into two, with senior management taking on both
Strategic and Tactical responsibilities. Junior management could have both Tactical and
Operational roles.
4.2 Generic Processes
Generic Processes provide the essential infrastructure for the implementation, assessment, and
improvement of ISMS processes. For further description, see Section 2.4.1.1.
4.2.1 GP-1: Knowledge Management
Generic Practice GP-1: Knowledge Management
Description The process gathers, analyzes, stores, communicates, and shares knowledge within the
organization. It supports the ISMS by defining document quality standards, organization, and
distribution of the documents and records associated with specific processes and helps keep
them up-to-date by requiring document expiration and review. While knowledge can be stored
using expert systems, wikis, and collaboration platforms, among others, documents are considered the most widely used knowledge repository.
Value Security processes are implemented in a robust and repeatable way when associated documents
are attributable, up-to-date, retrievable, and subject to a review process, as documents are key
for keeping and communicating knowledge. This process improves efficiency by reducing the need to re-acquire knowledge.
![Page 53: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/53.jpg)
Open Information Security Management Maturity Model (O-ISM3) 37
Generic Practice GP-1: Knowledge Management
Documentation GP-011: Review and Approval Policy
GP-012: Review and Approval Procedure
GP-013: Distribution Policy
GP-014: Distribution Procedure
GP-015: Document Retrievability, Expiry, and Retention Policy
GP-016: Catalog Maintenance Procedure
Inputs Expert knowledge
Process description, responsibilities, and scope
Outputs List of reviewed documents
List of approved new and updated documents
List of distributed and retired document versions (including version number and date)
Metrics Report (TSP-4)
Reports: Documents that reflect a summary and interpretation of the results of a process.
Templates and Forms: General layout and format of type of document.
Plans: Documents to define the scope of a process, the resources necessary to establish and
perform it, and how to set it up.
Checklists: Documents that support carrying out a complex task in a consistent manner.
Agreements: Documents to specify commitments and responsibilities related to the process; for
example:
Acceptable Use Policy: Informs users about their obligations when using the organization’s information systems
Third-party Code of Connection: Define mutual commitments at the organization’s borders with others
Insurance Policy
Non-disclosure Agreements
Policies: Documents to specify requirements, priorities, and rules for the process; for example:
GP-024: Information Security Policy, which must include Information Security Objectives
GP-017: Lifecycle Control Policy
GP-018: Access and Environmental Control Policy (including Third-party Code of Connection Agreement)
GP-019: Availability Management Policy
GP-022: Testing and Auditing Policy
GP-01B: Monitoring Policy
GP-01A: Incident Handling Policy
GP-01D: Personnel Management Policy
GP-01E: Acceptable Use Policy
Procedures: Documents that reflect what a process does and how it relates to other processes.
These documents normally specify:
What the procedure is for
Who can apply it, who can change it
Responsibilities for compliance with the procedure
![Page 54: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/54.jpg)
38 Open Group Standard (2011)
Generic Practice GP-1: Knowledge Management
Scope of the procedure (who and where)
When the process starts and finishes
Step-by-step description of tasks (who, what, when)
Acceptable task completion times
How to solve and escalate conflicts/exceptions
Related forms and communication channel
Responsibilities Process Owner: The individual who has responsibility for creating or updating the document.
Reminder: As explained in the Process Definition table in Section 2.4.3, there can be more than
one instance of a process, so every instance will have an individual process owner. Also, process
owners can be a person or a team, so it is possible that a collective of people acting as a team
can perform the role of process owner.
Related Processes All ISM3 processes.
Related
Methodologies
AS 5037:2005
ISO 9001:2000
4.2.2 GP-2: ISMS and Business Audit
Generic Practice GP-2: ISMS and Business Audit
Description This process validates whether:
The process documentation, inputs, outputs, and activities comply with standards,
laws, regulations, and internal policies
The existing scheme of delegation follows TPSRSR rules
The processes inputs, activities, and results match their documentation
It can be applied to test all processes compliance and capability or a representative sample.
The auditor should plan, document, and carry out the audit to minimize the chance of reaching
an incorrect conclusion, following relevant professional guidelines.
Value Incidents arising from faults in the ISMS can be prevented by checking the system and taking
action to address areas of improvement, for example:
Compliance of business processes with applicable regulations
Scheme of delegation following TPSRSR rules
Implementation of ISMS as defined
Documentation GP-021: Audit Policy (Criteria, Scope, Rules)
GP-022: Audit Procedure (Method)
Inputs GP-024: Information Security Policy
SSP-041: TPSRSR Policy
ISM documentation of the audited process
Outputs of every audited process
Results of previous audits
Outputs Audit Report
TPSRSR Rules Report
Metrics Report (TSP-4)
![Page 55: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/55.jpg)
Open Information Security Management Maturity Model (O-ISM3) 39
Generic Practice GP-2: ISMS and Business Audit
Responsibilities Supervisor: CEO
Process Owner: Internal or external Auditor.
The Audit Report must be communicated to the process owner of the audited process.
Related Processes All ISM3 processes.
Related
Methodologies
ISACA IS Auditing Standards
ISACA IS Control Professionals Standards
4.2.3 Implementing ISM3
Considerations on implementing ISM3 are provided in Chapter 6, with a view to enabling ISM
practitioners to benefit from the experience of ISM3 implementers.
GP-3: ISM Design and Evolution and GP-1: Knowledge Management are the main processes
necessary to ―boot‖ an ISM3 information management system.
4.2.3.1 GP-3: ISM Design and Evolution
Generic Practice GP-3: ISM Design and Evolution
Description This process validates whether the existing operational process matches (or does not match) the
organization's needs and compliance goals, expressed as business objectives. It also validates whether the process performs better and more efficiently than was the case previously.
Scope includes the following areas:
Organizational mission and environment
Statutory/regulatory compliance
Privacy protection, both of employees and customers
Intellectual property protection
This process selects the most appropriate operational processes to achieve the security targets.
There are a variety of techniques available to assist in the choices of which security processes should be included to enable achievement of the security targets.
Modeling the organization is helpful for doing risk, threat, vulnerability, and business impact
evaluation. Depending on the scope and depth of the evaluation, models of the following types are useful:
Information system model
Financial model
Logistic model (transport, supplies, waste)
Infrastructure model (energy, space, environmental conditions)
Personnel and responsibilities model
Organizational reputation model
These techniques should add value producing reproducible results in a cost-effective way.
The smallest units considered by an ISM3-focused risk evaluation are business objectives,
security objectives, and IT managed domains.
![Page 56: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/56.jpg)
40 Open Group Standard (2011)
Generic Practice GP-3: ISM Design and Evolution
Value Development of specific business objectives requires a strategic understanding of the
organization’s environment and business goals. The business objectives provide the foundation for the Information Security Policy and the Information Security Targets.
Every organization has different security targets, acts in different IT managed domains, and has
different resources. An appropriate selection of processes will give a good return on the security investment.
The efficiency of processes and their effectiveness can degrade over time unless there is a
continuous effort in the organization towards higher levels of capability.
Documentation GP-030: Internal and External Threats and Vulnerabilities to Business and Security Objectives
per IT managed domain template
GP-031: Recommended Investment in Existing and New ISM Processes per IT managed
domain template
GP-032: ISM Design and Evolution Methodology
GP-01G: Risk Management Policy
GP-033: Information Security Policy Template
Inputs Organizational objectives and strategy
GP-017: Lifecycle Control Policy
GP-024: Information Security Policy
Information Security Targets (TSP-3)
Allocate Resources for Information Security (SSP-6)
Inventory of Assets (OSP-3)
Incident Reports (OSP-24)
Intrusions Reports (OSP-24)
Forensics Reports (OSP-25)
Backup Test Report (OSP-10)
Enhanced Reliability and Availability Test Report (OSP-26)
Operations Continuity Test Report (OSP-15)
Potential Attackers Capabilities Report (TSP-14)
Potential Attackers Counter-Espionage Report (TSP-14)
![Page 57: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/57.jpg)
Open Information Security Management Maturity Model (O-ISM3) 41
Generic Practice GP-3: ISM Design and Evolution
Outputs Internal and External Threats and Vulnerabilities to Business and Security Objectives per IT
managed domain
Acceptable Internal and External Threats and Vulnerabilities to Business and Security
Objectives per IT managed domain
Threats to Insure Report (TSP-13)
Recommended Investment in Existing and New ISM Processes per IT managed domain (SSP-6)
Information Security Management Processes Definition (including priorities and investments
needed)
Security Processes Policies:
GP-033: Information Security Policy
GP-017: Lifecycle Control Policy
GP-018: Access and Environmental Control Policy
GP-019: Availability Management Policy
GP-01C: Testing and Auditing Policy
GP-01B: Monitoring Policy
GP-01A: Incident Handling Policy
GP-01D: Personnel Management Policy
Metrics Report (TSP-4)
Responsibilities Supervisor: Chief Executive and a Stakeholders representatives
Process Owner: Chief Information Officer
Related Processes SSP-4: Define Division of Duties Rules
SSP-6: Allocate Resources for Information Security
TSP-3: Define Security Targets
TSP-13: Insurance Management
OSP-3: Inventory Management
OSP-24: Handling of Incidents and Near-incidents
OSP-25: Forensics
OSP-20: Incident Emulation
OSP-19: Internal Technical Audit
Related
Methodologies
ISO 544R (Support Package for ISO 9001:2000)
Business Impact Assessment
Risk Assessment, Threat Assessment, Vulnerability Assessment: AS/NZS 4360, CRAMM,
EBIOS, ISO/IEC 27005:2008, MAP MAGERIT, CLUSIF MEHARI, OCTAVE, NIST SP 800-30, The Open Group Risk Taxonomy Technical Standard
4.3 Specific Processes – Strategic Management
Strategic management is responsible for selecting and designing services to provide value within
the cost and risk parameters of the organization. Strategic management is accountable to
stakeholders for the use of resources through governance arrangements. The customers of
strategic management are therefore external and possibly internal stakeholders. For further
description, see Section 2.4.1.
![Page 58: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/58.jpg)
42 Open Group Standard (2011)
4.3.1 SSP-1: Report to Stakeholders
Process SSP-1: Report to Stakeholders
Description Annual or quarterly report to stakeholders of compliance with applicable regulations, and of
performance in relation to budget allocations and security targets.
Value In order to take decisions about future investment and activities of the organization, stakeholders
require information about performance, including significant developments in information security.
Documentation SSP-011: Strategic Information Security Report Template
Inputs Operational Information Security Report (OSP-1)
Tactical Information Security Report (TSP-1)
Metrics Reports (from the rest of Strategic Processes)
Outputs Strategic Information Security Report (for the stakeholders)
Metrics Report (for the stakeholders)
Responsibilities Supervisor: stakeholder representatives
Process Owner: Chief Executive and Chief Information Officer
Related Processes TSP-1: Report to Strategic Management
Related
Methodologies
Not Applicable
4.3.2 SSP-2: Coordination
Process SSP-2: Coordination
Description Coordination between leadership of the organization and leadership of the security function.
Value Coordination between personnel responsible for security (information, physical, personal) and
organizational leaders is required to ensure the support of the whole organization and help the organization achieve its goals and optimize resources.
Documentation SSP-021: Meeting Minutes Template
Inputs Information security and other security objectives
Outputs Meeting Minutes
Metrics Report (SSP-1)
Information security processes that support the organization
Responsibilities Supervisor: Stakeholder representatives
Process Owner: Chief Executive
Related Processes Not Applicable
Related
Methodologies Not Applicable
4.3.3 SSP-4: Define Division of Duties Rules
Process SSP-4: Define Division of Duties Rules
Description In this process, rules are defined for the allocation and management of security responsibilities
throughout the organization.
![Page 59: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/59.jpg)
Open Information Security Management Maturity Model (O-ISM3) 43
Process SSP-4: Define Division of Duties Rules
Value Clear rules for the division of duties can improve the use of resources and reduce the risk of
security incidents by helping protect the organization from internal threats.
Documentation SSP-041: TPSRSR Policy Template
Rules for transparency, partitioning, supervision, rotation, and separation of responsibilities
should be applied throughout the organization, such as:
Transparency: An audit trail should exist for all critical organizational processes that can be checked by supervisors and auditors.
Partitioning: All responsibilities should belong to one and only one role. No
responsibility should be left unassigned.
Supervision: For every role there should be another role with the responsibility to
check and supervise actively or passively.
Rotation: No person should hold a responsibility indefinitely (or even predictably). No person should hold certain critical roles for an unlimited span of time.
Separation of Responsibilities: No person should carry out a sensitive process from end to end, or hold incompatible roles.
Inputs Organizational objectives and strategy
Outputs SSP-041: TPSRSR Policy
Metrics Report (SSP-1)
Responsibilities Supervisor: Stakeholder representatives
Process Owner: Chief Executive and Business Unit Managers
Related Processes GP-2: ISMS and Business Audit
Related
Methodologies Not Applicable
4.3.4 SSP-6: Allocate Resources for Information Security
Process SSP-6: Allocate Resources for Information Security
Description This process allocates resources for people, budget, and facilities to tactical and operational
management.
Value Implementation of an ISMS requires investment in tactical and operational management processes.
Documentation SSP-061: Information Security Budget Template
Inputs Recommended Investment in Existing and New ISM Processes per IT managed domain (GP-3)
Incident Valuation Report (TSP-4)
ISM Performance and Return on Investment Report (TSP-4)
Outputs Resources allocated to Information Security Management
Information Security Budget (TSP-2, GP-3, OSP-2)
Metrics Report (SSP-1)
Scope Fraction of ISM processes that have resources assigned
Responsibilities Supervisor: Stakeholder representatives
Process Owner: Chief Executive and Business Unit Managers
Related Processes All ISM3 processes
![Page 60: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/60.jpg)
44 Open Group Standard (2011)
Process SSP-6: Allocate Resources for Information Security
Related
Methodologies
Not Applicable
4.4 Specific Processes – Tactical Management
Strategic management is the customer of tactical management in respect of ISM processes.
Tactical management is accountable to strategic management for the performance of the ISMS
and for the use of resources. For further description, see Section 2.4.1.3.
4.4.1 TSP-1: Report to Strategic Management
Process TSP-1: Report to Strategic Management
Description A regular report of security outcomes and the use of allocated resources.
Value A report to strategic management is required to demonstrate the performance, efficiency, and
effectiveness of the ISMS.
Documentation TSP-011: Tactical Information Security Report Template
Inputs Operational Information Security Report (OSP-1)
Metrics Reports (from all Tactical Processes)
ISM Performance and Return on Investment Report (TSP-4)
Outputs Tactical Information Security Report (SSP-1)
Responsibilities Supervisor: GP-3 Process Owner
Process Owner: Chief Information Officer or Information Security Tactical Manager
Related Processes OSP-1: Report to Tactical Management
Related
Methodologies
Not Applicable
4.4.2 TSP-2: Manage Allocated Resources
Process TSP-2: Manage Allocated Resources
Description Tactical management allocates resources to all tactical and operational management processes.
Value Planning and control in the allocation of resources is required to ensure the ISM is configured to
achieve the security targets.
Documentation TSP-021: Information Security Resources Assignment Template
TSP-022: Information Security Resources Request Template
Inputs Information Security Budget (SSP-6)
Information Security Resources Request (from Tactical and Operational Processes)
Outputs Information Security Resources Assignment (to Tactical and Operational Processes)
Metrics Report (TSP-4)
Responsibilities Supervisor: GP-3 Process Owner
Process Owner: Information Security Tactical Manager
Related Processes SSP-6: Allocate Resources for Information Security
![Page 61: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/61.jpg)
Open Information Security Management Maturity Model (O-ISM3) 45
Process TSP-2: Manage Allocated Resources
Related
Methodologies
Not Applicable
4.4.3 TSP-3: Define Security Targets and Security Objectives
Process TSP-3: Define Security Targets and Security Objectives
Description This process specifies security targets for specific business objectives, security objectives per
the associated IT managed domain, and related policies/standards.
Business, compliance, personnel, access control, priority, durability, information quality, and technical-related requirements are taken into account.
Value The definition of the security targets and security objectives per IT managed domain provides
the basis for building the processes of the ISMS.
Documentation TSP-031: Information Security Targets Template
TSP-032: Information Requirements and Classification Template
GP-01E: Acceptable Use Policy Template
TSP-034: Third-Party Code of Connection Agreement Policy Template
GP-017: Lifecycle Control Policy
Inputs Information Security Policy (GP-024, GP-3)
Outputs Information Security Targets (TSP-4, GP-3, OSP-2, OSP-8, OSP-9, OSP-20)
Information Requirements and Classification (Documentation)
Acceptable Use Policy (TSP-10, TSP-11)
Metrics Report (TSP-4)
Responsibilities Supervisor: GP-3 Process Owner
Process Owner: Chief Information Officer
Related Processes GP-3: ISM Design and Evolution
Related
Methodologies
Not Applicable
4.4.4 TSP-4: Service Level Management
Process TSP-4: Service Level Management
Description Defines process metrics for other processes in the ISM.
Reviews the thresholds for every process metric.
Monitors metric measurements and requests action on observation of abnormal metric
measurements.
Feeds inputs for testing purposes to other processes and requests action if they fail to produce the expected outputs.
Suggests fixes and improvement of the processes.
Suggests improvement in the use of resources of the processes.
Evaluates the cost of incidents.
Value Information derived from metrics provides an objective way of assessing the ISMS and its
component processes.
![Page 62: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/62.jpg)
46 Open Group Standard (2011)
Process TSP-4: Service Level Management
Documentation TSP-041: Process Metrics Definition Template
TSP-042: ISM Performance and Return on Investment Report Template
TSP-043: Incident Valuation Report Template
Inputs Information Security Targets (TSP-3)
Physical Presence Logs (OSP-14)
Environmental Conditions Logs (OSP-14)
Security Awareness Report (TSP-4)
Log of Denied and Granted Access Requests (OSP-12)
Unauthorized Access Attempts Report (OSP-11)
Malware Protection Deployment and Update Level Report (OSP-17)
Filter Rules Report (TSP-4)
Intrusion Report (OSP-24)
Forensic Report (OSP-25)
Metrics Reports (from all Operational Processes)
Outputs Remediation of errors and faults in the processes
Process Metrics Definition (for every Operational Process)
Incident Valuation Report (SSP-6)
ISM Performance and Return on Investment Report (TSP-1, SSP-6)
Metrics Report (TSP-1)
Responsibilities Supervisor: GP-3 Process Owner
Process Owner: Information Security Tactical Manager
Related Processes TSP-3: Define Security Targets
OSP-24: Handling of Incidents and Near-incidents
OSP-25: Forensics
Related
Methodologies
Six Sigma DMAIC
ITIL
4.4.5 TSP-6: Security Architecture
Process TSP-6: Security Architecture
Description This process manages:
The IT security architecture of the organization, using security patterns to provide
generic, scalable solutions that enable the creation and evolution of new information
systems that serve the needs of the organization
Significant logical IT managed domains and their lifecycles; within each environment, there may be a separate instance of some operational processes
Value Identification and definition of different IT managed domains and the systems grouped within
them is required to ensure that appropriate environmental and lifecycle control processes are
implemented. The implementation of security patterns reduces costs, and risk, and increases agility in the implementation of information systems.
Documentation TSP-061: IT Managed Domains and Lifecycles Definition Template
TSP-062: IT Security Architecture
![Page 63: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/63.jpg)
Open Information Security Management Maturity Model (O-ISM3) 47
Process TSP-6: Security Architecture
Inputs GP-017: Lifecycle Control Policy (Documentation)
Working IT managed domains in the organization
States and events that mark state transition in every IT managed domain
Outputs IT Managed Domains and Lifecycles Definition (Documentation)
Metrics Report (TSP-4)
Note VII: UML state diagrams are recommended for lifecycle documentation.
Responsibilities Process owner: Chief Information Officer
Related Processes OSP4-7: Information Systems Lifecycle Management
Related
Methodologies
Enterprise Security Architecture (The Open Group)
Federal Enterprise Architecture (USA)
ISO 15228: 2005
SABSA
Security Design Patterns
Serenity Project (EU)
TOGAF 9 (The Open Group)
4.4.6 TSP-13: Insurance Management
Process TSP-13: Insurance Management
Description This measure uses insurance to transfer risk to a third party, in exchange for payment of a fixed fee or premium.
Value The financial impact of serious incidents can be mitigated by sharing of risk with others through
taking out an appropriate insurance policy.
Documentation GP-01G: Risk Management Policy
Inputs Threats to Insure Report (GP-3)
Inventory of Assets (OSP-3)
Outputs Threats Insured
Insurance Contracts (OSP-15)
Metrics Report (TSP-4)
Responsibilities Supervisor: GP-3 Process Owner
Process Owner: Information Security Management
Related Processes GP-3: ISM Design and Evolution
Related
Methodologies
Not Applicable
4.4.7 Personnel Security
4.4.7.1 TSP-7: Background Checks
Process TSP-7: Background Checks
Description This process aims to ensure that new employees in sensitive roles do not pose a threat to the organization.
![Page 64: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/64.jpg)
48 Open Group Standard (2011)
Process TSP-7: Background Checks
Value Personnel trusted to carry out security processes must be competent, accountable, and
empowered. Background checks can be used to evaluate the suitability of potential employees.
Documentation TSP-071: Background Check Procedure
TSP-072: Background Check Report Template
Inputs Job Definition (from Human Resources)
Human Resources Policies (from Human Resources)
Outputs Background Check Report (for Human Resources)
Metrics Report (TSP-4)
Responsibilities Supervisor: GP-3 Process Owner
Process Owner: Human Resources
Related Processes TSP-8: Personnel Security
Related
Methodologies
Not Applicable
4.4.7.2 TSP-8: Personnel Security
Process TSP-8: Personnel Security
Description This process aims to assure the commitment, competency, knowledge, and experience of
employees while their liaison with the organization lasts through evidence-based assessment.
This process is closely linked with OSP-12 so that changes in personnel role or status are promptly reflected by access rights.
Value Personnel trusted to carry out security processes must be competent, accountable, and
empowered. Evidence in the form of responses to skills-based interview questions, professional
certifications, and educational qualifications are needed to support selection decisions.
Documentation TSP-081: Selection of Security Personnel Procedure
TSP-082: Selection of Security Personnel Report Template
TSP-083: Non-disclosure Agreement Template
Inputs Job Definition (from Human Resources)
Contracts of Employment (from Human Resources)
Human Resources Policies (from Human Resources)
Personnel/professional development schemes (from Human Resources)
Outputs Selection of Security Personnel Report (to Human Resources)
Non Disclosure Agreements (to Human Resources)
Metrics Report (TSP-4)
Personnel Status Changes (OSP-12)
Responsibilities Supervisor: GP-3 Process Owner
Process Owner: Human Resources
Related Processes TSP-7: Background Checks
Related
Methodologies
P-CMM
![Page 65: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/65.jpg)
Open Information Security Management Maturity Model (O-ISM3) 49
4.4.7.3 TSP-9: Security Personnel Training
Process TSP-9: Security Personnel Training
Description This process ensures that security personnel develop their skills and professional skills.
Value Personnel trusted to carry out security processes must be competent, accountable, and
empowered. A planned and monitored training and development program is required to ensure that processes are performed by competent personnel.
Documentation TSP-091: Training on Security Report Template
TSP-092: Security Training Plan
Inputs Human Resources Policies (from Human Resources)
Outputs Training on Security Report (to Human Resources)
Metrics Report (TSP-4)
Responsibilities Supervisor: GP-3 Process Owner
Process Owner: Human Resources
Related Processes Not Applicable
Related
Methodologies
P-CMM
4.4.7.4 TSP-10: Disciplinary Process
Process TSP-10: Disciplinary Process
Description Disciplinary procedures prevent and mitigate incidents resulting from employee misbehavior.
Value Personnel trusted to carry out security processes must be competent, accountable, and
empowered. A disciplinary process is required to enforce personal accountability and
responsibility.
Documentation TSP-101: Disciplinary Procedure
TSP-102: Disciplinary Report Template
Inputs Incident Report (OSP-24)
Contracts of Employment (from Human Resources)
GP-01E: Acceptable Use Policy (TSP-3)
Outputs Disciplinary Report (to Human Resources)
Metrics Report (TSP-4)
Responsibilities Supervisor: GP-3 Process Owner
Process Owner: Human Resources
Related Processes OSP-24: Handling of Incidents and Near-incidents
Related
Methodologies
P-CMM
4.4.7.5 TSP-11: Security Awareness
Process TSP-11: Security Awareness
Description This process informs and educates users, raising the profile of information security throughout
the organization.
![Page 66: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/66.jpg)
50 Open Group Standard (2011)
Process TSP-11: Security Awareness
Value A high standard of security awareness throughout the organization is required to prevent and
mitigate security incidents. Many incidents are the result of failures by authorized users to
comply with policy, not technical breaches. Security culture is important as it implies a more
proactive approach than ―awareness‖. Organizations developing security culture push the
security message through newsletters, screensavers, rewarding and promoting good behavior,
and action against offenders, and develop a moral sense of self-discipline that embraces passive awareness of policy and training materials.
Documentation TSP-111: Security Awareness Report Template
TSP-112: Staff Training Manual
Inputs GP-024: Information Security Policy
GP-01E: Acceptable Use Policy (TSP-3)
Outputs Security Awareness Report (TSP-4)
Metrics Report (TSP-4)
Responsibilities Supervisor: GP-3 Process Owner
Process Owner: Human Resources
Related Processes Not Applicable
Related
Methodologies
HIMIS
4.4.8 TSP-14: Information Operations
Process TSP-14: Information Operations
Description This process gathers information about the capabilities of potential and present attackers, while misinforming them about the strengths and weaknesses of the organization.
Value The less accurate and complete the information a potential attacker has about the organization,
the less likely that an attack will be successful, and the higher the cost of any such attack will be.
The more complete and accurate the information the organization has about potential attackers, the more likely that the organization will be able to protect against attacks.
Documentation GP-024: Information Security Policy
TSP-141: Disinformation Report Template
TSP-142: Potential Attackers Capabilities Report Template
Inputs GP-024: Information Security Policy
TSP-143: Disinformation Procedure
TSP-144: Potential Attackers Espionage Procedure
TSP-145: Potential Attackers Counter-Espionage Procedure
Outputs Disinformation Report (TSP-4)
Potential Attackers Capabilities Report (GP-3)
Potential Attackers Counter-Espionage Report (GP-3)
Metrics Report (TSP-4)
Responsibilities Supervisor: GP-3 Process Owner
Process Owner: Information Security Management
Related Processes Not Applicable
![Page 67: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/67.jpg)
Open Information Security Management Maturity Model (O-ISM3) 51
Process TSP-14: Information Operations
Related
Methodologies
Information Operations (JP 3-13 2006)
Operations Security (JP 3-13.3)
Military Deception (JP 3-13.4)
4.5 Specific Processes – Operational Management
Operational management reports to the Chief Information Officer and the Information Security
Tactical Manager. For further description, see Section 2.4.1.3.
4.5.1 OSP-1: Report to Tactical Management
Process OSP-1: Report to Tactical Management
Description A regular report of process results and the use of allocated resources.
Value A report to tactical management is required to show the performance and effectiveness of the specific processes in use.
Documentation OSP-011: Operational Information Security Report Template
Inputs Metrics Reports from Operational Processes (the same as for TSP-4)
Outputs Operational Information Security Report (TSP-1, TSP-4)
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Security Operational Manager
Related Processes OSP-3: Inventory Management
OSP-20: Incident Emulation
OSP-23: Internal Events Detection and Analysis
OSP-24: Handling of Incidents and Near-incidents
Related
Methodologies
Not Applicable
4.5.2 OSP-2: Security Procurement
Process OSP-2: Security Procurement
Description Selection of the specific products, providers, and outsourcing providers that best fit the
information security objectives and metrics within the budget assigned.
Value Efficient use of resources results from effective selection of appropriate security tools, providers, and outsourcing services.
Documentation OSP-02 : Procurement Recommendations Report Template
Inputs Published Comparatives (Publications)
Jericho Forum Vendor Self-assessment Reports
Security Scoreboard User Ratings
Selection Criteria Best Practices (Updates, Metrics, Learning curve, etc.)
Information Security Targets (TSP-3)
Information Security Budget (SSP-6)
![Page 68: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/68.jpg)
52 Open Group Standard (2011)
Process OSP-2: Security Procurement
Outputs Procurement Recommendations Report (GP-3)
Metrics Report (TSP-4)
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Security Operational Manager
Related Processes GP-3: ISM Design and Evolution
Related
Methodologies
ISO/IEC 15408:2009
4.5.3 Lifecycle Control
Lifecycle maintenance is normally a responsibility of the information systems department. The
security role has the responsibility for protecting information systems through their lifecycle.
4.5.3.1 OSP-3: Inventory Management
Process OSP-3: Inventory Management
Description This process identifies, grades, and values the assets (repositories, interfaces, services, and
channels) to be protected. It should identify:
The Information System Owner for each information system, the IT managed domain it belongs to, and the current state within that IT managed domain
The authorized audience of important removable repositories keeping an inventory of copies and who owns them
The licensing of installed and uninstalled software
The licensing of copyrighted information in use
To maintain a fully accurate inventory can be expensive and is exceedingly difficult in big
organizations. ISM3 recognizes this difficulty, so this process may be performed either as a periodic or a real-time (detection) process.
Value Operation of the ISMS depends upon the identification of critical assets to protect and an
appropriate grading using, for example, the Information Assurance Markup Language (IAML).
Documentation OSP-031: Inventory Procedure
OSP-032: Asset Naming Policy
OSP-033: Asset Labeling Procedure
TSP-032: Information Classification and Requirements
Inputs Known Hardware
Known Software
Other Known Information Repositories
Clearing Report (OSP-6)
Outputs Inventory of Assets (Multiple Processes)
Classified Repositories and Messages
Prioritized Interfaces, Services, and Channels
Durability and Quality Grouped Repositories
Metrics Report (TSP-4)
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Systems Management
![Page 69: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/69.jpg)
Open Information Security Management Maturity Model (O-ISM3) 53
Process OSP-3: Inventory Management
Related Processes TSP-3: Define Security Targets
OSP-4: Information Systems IT Managed Domain Change Control
Related
Methodologies
Not Applicable
4.5.3.2 OSP-4: Information Systems IT Managed Domain Change Control
Process OSP-4: Information Systems IT Managed Domain Change Control
Description This process prevents incidents caused by changes of state within an IT managed domain and by
transitions between IT managed domains.
Examples of IT managed domains are server IT managed domain, user IT managed domain, and
development IT managed domain.
Examples of states within an IT managed domain are reception, operation, change of ownership,
external maintenance, retirement, sale, theft.
When a component changes state, its manager or the purpose for which it is used may change.
Channels and interfaces to other IT managed domains may be affected.
Value Incidents, including loss of information and reliability, can result from poorly managed
transition between states in an IT managed domain.
Documentation OSP-041: IT Managed Domains and Lifecycles Definition
OSP-042: Lifecycle Control Policy
Inputs Alerts, Fixes, and Threats Report (OSP-22)
Attack Emulation Report (OSP-19)
Services Update Level Report (OSP-5)
Clearing Report (OSP-6)
Hardening Report (OSP-7)
Information Completeness, Precision, Update, and Fair-Use Report (OSP-21)
Outputs Compliant interfaces in every IT managed domain
Compliant channels in every IT managed domain
Compliant services in every IT managed domain
Compliant repositories in every IT managed domain
Metrics Report (TSP-4)
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Systems Management
Related Processes TSP-6: Security Architecture
OSP-5: IT Managed Domain Patching
OSP-6: IT Managed Domain Clearing
OSP-7: IT Managed Domain Hardening
OSP-22: Alerts Monitoring
Related
Methodologies
Not Applicable
![Page 70: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/70.jpg)
54 Open Group Standard (2011)
4.5.3.3 OSP-5: IT Managed Domain Patching
Process OSP-5: IT Managed Domain Patching
Description This process covers the ongoing update of services to prevent incidents related to known
weaknesses, enhancing the reliability of the updated systems.
Value Patching prevents incidents arising from the exploitation of known weaknesses in services.
Documentation OSP-051: Services Update Level Report Template
OSP-052: Services Patching Management Procedure
Inputs Inventory of Assets (OSP-3)
Outputs Up-to-date services in every IT managed domain
Services Update Level Report (OSP-4)
Metrics Report (TSP-4)
Quality Update level, calculated as follows:
The update level for a specific information system is equal to the sum of the days outstanding for all pending security patches.
The IT managed domain update level is equal to the sum of the individual update
levels, divided by the number of information systems.
The lower this metric, the better. This metric allows checking of the progress of the patching
process, and comparison of the update level of different IT managed domains.
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Systems Management
Related Processes OSP-4: Information Systems IT Managed Domain Change Control
OSP-9: Security Measures Change Control
Related
Methodologies
Project Quant
4.5.3.4 OSP-6: IT Managed Domain Clearing
Process OSP-6: IT Managed Domain Clearing
Description This process covers procedures for clearing whole repositories or previous versions of
information or changed parts of repositories to prevent disclosure of information. Clearing might affect licensed software and copyrighted information.
Value Clearing or destroying of repositories is required to prevent disclosure incidents which can occur
when an information system or repository is changed leaving previous versions of information
behind, or when the repository (for example, a tape or hard disk) leaves an IT managed domain or passes outside the control of the organization.
Documentation OSP-061: Repository Clearing Procedure
OSP-062: Clearing Report Template
Inputs Inventory of Assets (OSP-3)
Outputs Cleared Repositories
Clearing Report (OSP-4, OSP-3)
Metrics Report (TSP-4)
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Systems Management
![Page 71: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/71.jpg)
Open Information Security Management Maturity Model (O-ISM3) 55
Process OSP-6: IT Managed Domain Clearing
Related Processes OSP-4: Information Systems IT managed domain Change Control
OSP-9: Security Measures Change Control
OSP-3: Inventory Management
OSP-27: Archiving Management
Related
Methodologies
Not Applicable
4.5.3.5 OSP-7: IT Managed Domain Hardening
Process OSP-7: IT Managed Domain Hardening
Description This process improves the configuration of channels, services, ports, interfaces, and repositories,
enhancing their reliability. The process removes unused channels, services, ports, interfaces, and repositories.
Value IT managed domain hardening is required for assets, specially at an IT managed domain’s
borders, where the assets are visible to zones of lower or unknown security. This is to protect
information in the visible zone and prevent the visible zone from extending further than required within the organization.
Documentation OSP-071: Service Hardening Procedure
OSP-072: Interface Hardening Procedure
OSP-073: Repository Hardening Procedure
OSP-074: Channels Hardening Procedure
OSP-075: Hardening Report Template
Inputs Inventory of Assets (OSP-3)
Outputs Hardened services, interfaces, repositories, and channels
Hardening Report (OSP-4)
Metrics Report (TSP-4)
Quality Update level, calculated as follows:
The update level for a specific information system is equal to the sum of the days outstanding for all pending security patches.
The IT managed domain update level is equal to the sum of the individual update levels, divided by the number of information systems.
The lower this metric, the better. This metric allows checking of the progress of the hardening
process, and comparison of the hardening level of different IT managed domains.
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Systems Management
Related Processes OSP-4: Information Systems IT Managed Domain Change Control
OSP-9: Security Measures Change Control
Related
Methodologies
CIS
NSA
![Page 72: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/72.jpg)
56 Open Group Standard (2011)
4.5.3.6 OSP-8: Software Development Lifecycle Control
Process OSP-8: Software Development Lifecycle Control
Description Organizations may choose between developing software in-house, or procuring it externally.
Structured processes and controls are needed to check that each installed service and information system is compliant with security targets.
Value An information system designed without regard to the OSP-8: SDLC security objectives and
targets may require additional security measures, resulting in higher maintenance costs.
Documentation OSP-081: Software Development Security Controls
OSP-082: Information Security Requirements
OSP-083: Information Security Requirements Test Report Template
OSP-194: Source Code Review Procedure
OSP-195: Source Code Review Report Template
Inputs Information Security Targets (TSP-3)
Alerts, Fixes, and Threats Report (OSP-22)
Source Code Review Report (OSP-19)
Outputs Certified and Working Software
Information Security Requirements Test Report (for the development team)
Metrics Report (TSP-4)
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Systems Management
Related Processes OSP-22: Alerts Monitoring
Related
Methodologies
BSIMM
ISO/IEC 12207:2008
OWASP
SPSMM
SSE-CMM
4.5.3.7 OSP-9: Security Measures Change Control
Process OSP-9: Security Measures Change Control
Description This process prevents incidents related to changes of state of security measures within an IT
managed domain and transitions between IT managed domains.
Examples of IT managed domains are: server IT managed domain, user IT managed domain,
development IT managed domain.
Examples of states within an IT managed domain are: acquisition, commissioning, production,
and decommissioning.
Value Changes in security personnel, new network devices, and altered security measures pose a threat
of opening unexpected weaknesses.
Documentation TSP-061: IT Managed Domains and Lifecycles Definition
GP-017: Lifecycle Control Policy
OSP-091: Security Measures Change Control Procedures
OSP-092: Security Measures Change Control Report Template
Inputs Information Security Targets (TSP-3)
Alerts, Fixes, and Threats Report (OSP-22)
![Page 73: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/73.jpg)
Open Information Security Management Maturity Model (O-ISM3) 57
Process OSP-9: Security Measures Change Control
Outputs Compliant Security Measures in every IT managed domain
Security Measures Change Control Report (TSP-4)
Metrics Report (TSP-4)
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Security Management
Related Processes TSP-6: Security Architecture
OSP-5: IT Managed Domain Patching
OSP-6: IT Managed Domain Clearing
OSP-7: IT Managed Domain Hardening
OSP-22: Alerts Monitoring
Related
Methodologies
Not Applicable
4.5.3.8 OSP-16: Segmentation and Filtering Management
Process OSP-16: Segmentation and Filtering Management
Description This process defines technical policies for the passage of authorized messages and
electromagnetic waves between zones, while denying passage to unauthorized messages and
EM waves. Messages and EM waves can be filtered at any abstraction level, ranging from level-
7 firewalls to spam filtering, instant messaging filtering, TCP/IP traffic filtering, VoIP filtering,
electromagnetic pulse filtering, etc. Third-party connections involve at least one of the
organization's zones and an external zone. An alternative to denying access is using a quarantined environment with limited access.
Value Incidents arising from intrusion, vandalism, and misuse of information systems can be prevented
and mitigated by appropriate segmentation of IT managed domains and repositories and filtering of messages.
Documentation OSP-162: Internal Zones Filtering Procedure
OSP-163: Border Filtering Procedure
OSP-164: Filter Authorizations Report Template
GP-018: Access and Environmental Control Policy (including Third-party Code of Connection
Agreement)
Inputs IT Managed Domains & Lifecycles Definition
Inventory of Assets (OSP-3)
Incident Detection Report (OSP-23)
Intrusion Detection Report (OSP-23)
Outputs Prevention of unauthorized passage of messages between IT managed domains
Filter Rules Report (TSP-4)
Logs of Drops (OSP-23)
Logs of Pass (OSP-23)
Metrics Report (TSP-4)
![Page 74: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/74.jpg)
58 Open Group Standard (2011)
Process OSP-16: Segmentation and Filtering Management
Quality Update level, calculated as follows:
Update level of each filtering system is equal to the number of days old of updates notified but not yet applied.
The overall update level is equal to the sum of the individual update levels, divided by the number of filtering systems.
The lower this metric, the better. This metric provides a check on the appropriateness of the
current filtering arrangements, and allows comparison of the update level of different IT managed domains.
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Security Management
Related Processes OSP-2: Security Procurement
OSP-23: Internal Events Detection and Analysis
OSP-3: Inventory Management
OSP-12: User Registration
Related
Methodologies
Not Applicable
4.5.3.9 OSP-17: Malware Protection Management
Process OSP-17: Malware Protection Management
Description This is a set of security measures to provide protection against technical threats such as viruses,
spy ware, trojans, backdoors, key loggers, rootkits, and other unauthorized services. An alternative to cleaning or deleting the unauthorized service is to put it in a quarantined sandbox.
Value Incidents relating to the infection of internal assets with malware can be prevented and mitigated by an appropriate malware protection process.
Documentation OSP-171: Malware Protection Procedure
OSP-172: Malware Detection and Cleaning Report Template
OSP-173: Malware Protection Deployment and Update Level Report Template
GP-017: Lifecycle Control Policy
Inputs Inventory of Assets (OSP-3)
Incident Detection Report (OSP-23)
Outputs Protection of information systems from malware
Malware Detection and Cleaning Report (OSP-23)
Malware Protection Deployment and Update Level Report (TSP-4)
Metrics Report (TSP-4)
![Page 75: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/75.jpg)
Open Information Security Management Maturity Model (O-ISM3) 59
Process OSP-17: Malware Protection Management
Quality Update level, calculated as follows:
Malware update level for each information system is equal to the number of days old of malware signatures updates notified but not yet applied.
The overall IT managed domain malware update level is equal to the sum of the individual malware update levels, divided by the number of information systems.
The lower this metric, the better. This metric measures the degree of readiness against new
malware, and allows comparison of the update level of different IT managed domains.
Note VIII: Depending on the particular malware protection technology used, there might be
more than one component to measure. Some malware protection technologies don't use signatures at all.
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Security Management
Related Processes OSP-2: Security Procurement
OSP-23: Internal Events Detection and Analysis
OSP-3: Inventory Management
Related
Methodologies
Not Applicable
4.5.4 Access and Environmental Control
4.5.4.1 OSP-11: Access Control
Process OSP-11: Access Control
Description Access control is the means by which access to classified information is provided to and by
authorized users, while denied to unauthorized ones. Access control includes authentication of
users or services, authorization of users or services, signing of repositories, and recording of access and use of services, repositories, channels, and interfaces.
Authentication links the use of user accounts with their owners and manages the lifecycle of
sessions.
Authorization grants the use of services and interfaces and access to repositories to authorized
users and denies it to unauthorized users. An alternative to denying access is providing limited (quarantined) access rights instead.
Signing records demonstrates the will and intent of the owner of the user account or certificate
concerning a repository, such as agreeing, witnessing, or claiming authorship of repositories and messages like original works, votes, contracts, and agreements.
Recording registers accurately the results of the user registration, authentication, authorization,
use of systems, and signing processes, so these can be investigated and purpose or responsibilities determined, within the limits set by anonymity business objectives.
Value To make users accountable for their use of services, interfaces, and access to repositories, it is
necessary to link the use of user accounts with their owner, grant or deny access to services, interfaces, and repositories in real time, and record it.
Incidents like espionage, unlawful use of personal and licensed information, repudiation of
agreements, denial of authorship, and unauthorized change of messages and repositories can be prevented by access control procedures.
Documentation OSP-111: Access Control Policy
OSP-112: Unauthorized Access Attempts Report Template
GP-018: Access and Environmental Control Policy
![Page 76: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/76.jpg)
60 Open Group Standard (2011)
Process OSP-11: Access Control
Inputs Inventory of Assets (OSP-3)
Inventory of Premises (from Facilities)
User Registration and Access Control Review Report (OSP-19)
Outputs Grant of access to authorized users
Denial of access to unauthorized users
Logs of access to classified repositories
Logs of access to classified premises
Logs of use of classified services and interfaces
Unauthorized Access Attempts Report (TSP-4)
Metrics Report (TSP-4)
Quality Percentage of user accounts with configured delays between consecutive login failed
Percentage of user accounts for which sessions expire
Percentage of user accounts for which maximum number of simultaneous sessions is one
Percentage of user accounts for which credentials expire
Percentage of user accounts for which password credentials quality is controlled
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Security Management
Related Processes OSP-2: Security Procurement
OSP-3: Inventory Management
OSP-12: User Registration
Related
Methodologies
NIST RBAC
ISO 15489:2001
4.5.4.2 OSP-12: User Registration
Process OSP-12: User Registration
Description This process covers enrolment that can link user accounts and certificates to their identifiable or
anonymous owners and manages the lifecycle of certificates and user accounts, and the granting,
denial, and revocation of access rights. An alternative to denying access rights is providing limited (quarantined) access rights instead.
When protecting the anonymity of users is more important than making them accountable,
registration must guarantee that user accounts are not linked to identifiable users.
The rights requested can be related to:
Access, use or connection of services, repositories, and interfaces
Credentials and cryptographic keys
Changes in the filtering of channels
Physical access
Four roles are considered in this process: system owner, user, authorizer, and authority.
This process is closely linked with TSP-8, so that access rights are promptly updated when
personnel change role or status.
![Page 77: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/77.jpg)
Open Information Security Management Maturity Model (O-ISM3) 61
Process OSP-12: User Registration
Value To make users accountable for their use of services, interfaces, and access to repositories, it is
necessary to link user accounts to identifiable users.
Incidents arising from the inappropriate grant of access or concession of user accounts can be
prevented and mitigated by user registration procedures.
Documentation TSP-032: Information Requirements and Classification
GP-018: Access and Environmental Control Policy
OSP-122: Access Requests Procedure
OSP-123: Access Request Template
Inputs Inventory of Assets (OSP-3)
Access Request (from Users)
Personnel List of Leavers (from Human Resources)
User Registration and Access Control Review Report (OSP-19)
Personnel Status Changes (TSP-8)
Outputs Grant of requests to trusted users to repositories, channels, interfaces, and services
Denial of requests to distrusted users to repositories, channels, interfaces, and services
Log of Denied and Granted Access Requests (TSP-4)
Metrics Report (TSP-4)
Quality Percentage of access control systems for which unused user accounts expire
Percentage of access control systems for which password credentials for first login are not
predictable
Percentage of access control systems which require password credentials change upon first login
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Security Management
Related Processes OSP-2: Security Procurement
OSP-3: Inventory Management
OSP-14: Physical Environment Protection Management
OSP-16: Segmentation and Filtering Management
Related
Methodologies
Not Applicable
4.5.4.3 OSP-14: Physical Environment Protection Management
Process OSP-14: Physical Environment Protection Management
Description This process covers control of access into secure areas containing important repositories or
interfaces, and alternate facilities. It also covers protection of critical infrastructure from fire,
extreme temperatures, extreme humidity flood, electromagnetic anomalies, and other physical threats. An alternative to denying access is using a quarantined area with limited access.
Value Incidents caused by direct exploitation of assets and by physical damage resulting from
environmental factors can be prevented and mitigated by effective physical security measures.
Documentation GP-018: Access and Environmental Control Policy
OSP-142: Physical Access Procedure
OSP-143: Environmental Control Procedure
TSP-032: Information Requirements and Classification
![Page 78: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/78.jpg)
62 Open Group Standard (2011)
Process OSP-14: Physical Environment Protection Management
Inputs Inventory of Assets (OSP-3)
Outputs Prevention of environmental incidents
Prevention of unauthorized passage of assets between IT managed domains
Physical Presence Logs (TSP-4)
Environmental Conditions Logs (TSP-4)
Metrics Report (TSP-4)
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Facilities Manager
Related Processes OSP-2: Security Procurement
OSP-23: Internal Events Detection and Analysis
OSP-3: Inventory Management
OSP-12: User Registration
OSP-15: Operations Continuity Management
Related
Methodologies
Not Applicable
4.5.5 Availability Control
Availability management is the collective name for the availability, reliability, volatility,
retention period, and expiry security objectives and targets-related processes.
4.5.5.1 OSP-10: Backup Management
Process OSP-10: Backup Management
Description This process reduces the impact of information loss, achieving service-level requirements for
time to information systems recovery, recovery point date and time, and recovery time. Keeping
several recovery points increases the chances of finding a known good state of the information
or information system being backed up. Additional information and changes like files deleted or moved not present in recovery points might be salvaged using data recovery techniques.
Some backup systems require that no changes are made on the repository being backed up
during back up. In these systems, a conflict might arise between the required availability of the
repository and the duration of the backup. Recovering a system normally requires backing up file's meta data, permissions, file system layout, and settings.
Value Incidents arising from the loss of repositories can be mitigated by backup processes.
Documentation OSP-101: Backup and Restore Test Plan
OSP-102: Backup Report Template
OSP-103: Restore Report Template
GP-019: Availability Management Policy
TSP-032: Information Requirements and Classification
Inputs Inventory of Assets (OSP-3)
Incident Detection Report (OSP-23)
Backup Test Report (OSP-20)
![Page 79: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/79.jpg)
Open Information Security Management Maturity Model (O-ISM3) 63
Process OSP-10: Backup Management
Outputs Prevention of permanent information loss from repositories
Backup Report (OSP-15)
Restore Report (OSP-15)
Metrics Report (TSP-4)
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Systems Management or Information Security Management
Related Processes OSP-2: Security Procurement
OSP-3: Inventory Management
OSP-20: Incident Emulation
Related
Methodologies
Not Applicable
4.5.5.2 OSP-15: Operations Continuity Management
Process OSP-15: Operations Continuity Management
Description This process uses redundancy (such as off-site backup, redundant systems and communications,
spare parts) and dispersion (such as alternate facilities and off-site backup storage) to eliminate
critical single points of failure and reduce the impact of incidents that can threaten the existence
of the organization, achieving regulatory and business requirements for mean time to business processes recovery, checkpoint date and time, and degree of redundancy.
Value Events that might cause a sustained difficulty in providing service with subsequent loss of
customers and goodwill can be mitigated by operations continuity management before viability of the organization is seriously affected.
Documentation OSP-151: Operations Continuity Procedure
OSP-152: Operations Continuity Test Plan
OSP-153: Operations Continuity Test Report Template
GP-019: Availability Management Policy
TSP-032: Information Requirements and Classification
Inputs Inventory of Assets (OSP-3)
Insurance Contracts (TSP-13)
Incident Detection Report (OSP-23)
Backup Report (OSP-10)
Restore Report (OSP-10)
Backup Test Report (OSP-20)
Archival Restore Report (OSP-27)
Enhanced Reliability and Availability Test Report (OSP-20)
Operations Continuity Test Report (OSP-20)
Outputs Protection of the existence of the organization
Metrics Report (TSP-4)
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Security Management
![Page 80: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/80.jpg)
64 Open Group Standard (2011)
Process OSP-15: Operations Continuity Management
Related Processes OSP-2: Security Procurement
OSP-3: Inventory Management
OSP-20: Incident Emulation
OSP-23: Internal Events Detection and Analysis
Related
Methodologies
BS 25999
ISO/IEC 24762:2008
4.5.5.3 OSP-26: Enhanced Reliability and Availability Management
Process OSP-26: Enhanced Reliability and Availability Management
Description This is a set of redundancy, diversity, and dispersion-based security measures to eliminate single
points of failure, reduce the impact of equipment loss and failure, achieving service-level requirements for a short mean time to information systems recovery, checkpoint date, and time.
Note IX: Real-time detection and quick remediation of partial failures are essential to keep
mean time to repair within security targets.
Value Incidents arising from the loss of repositories and disruption to channels, interfaces, and services
can be mitigated by elimination of single points of failure and built-in resilience to total or partial failures.
Documentation OSP-264: Reliability and Availability Test Plan
OSP-265: Reliability and Availability Test Report Template
GP-019: Availability Management Policy
TSP-032: Information Requirements and Classification
Inputs Inventory of Assets (OSP-3)
Incident Detection Report (OSP-23)
Enhanced Reliability and Availability Test Report (OSP-20)
Outputs Prevention of permanent information loss from repositories
Prevention of interruption of channels, interfaces, and services
Metrics Report (TSP-4)
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Systems Management or Information Security Management
Related Processes OSP-2: Security Procurement
OSP-3: Inventory Management
OSP-20: Incident Emulation
OSP-23: Internal Events Detection and Analysis
Related
Methodologies
Not Applicable
![Page 81: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/81.jpg)
Open Information Security Management Maturity Model (O-ISM3) 65
4.5.5.4 OSP-27: Archiving Management
Process OSP-27: Archiving Management
Description This is a set of security measures to ensure long-term accessibility of stored information in
situations set by requirements for long periods of retention.
Strategies to guarantee information retrievability include copying information from old media
and formats to current ones or keeping obsolete systems in working order and monitoring storage media quality.
Value Incidents arising from the loss of repositories before their defined retention period or keeping
them beyond their expiry date can be mitigated storing, cataloging, and monitoring retrievability
periodically.
Documentation OSP-271: Archival and Archival Restore Test Plan
OSP-272: Archival Report Template
OSP-273: Archival Restore Report Template
GP-019: Availability Management Policy
TSP-032: Information Requirements and Classification
Inputs Inventory of Assets (OSP-3)
Outputs Prevention of permanent information loss from repositories
Archival Storage Report (OSP-15)
Archival Restore Report (OSP-15)
Metrics Report (TSP-4)
Quality Fraction of physical repositories older than end-of-life
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Systems Management, or Information Security Management
Related Processes OSP-3: Inventory Management
This process relies on OSP-6: IT Managed Domain Clearing for deletion of expired information.
Related
Methodologies
OASIS Reference Model
4.5.6 Testing and Auditing
4.5.6.1 OSP-19: Internal Technical Audit
Process OSP-19: Internal Technical Audit
Description This process validates:
Effectiveness of vulnerability reduction measures
Effectiveness of access control measures
Effectiveness of user registration measures
Effectiveness of filtering measures
Quality of the software developed in-house
It can be applied to all possible targets or a representative random sample.
When performing emulated attacks from internal systems, it is commonly called internal
―vulnerability‖ testing. When performing emulated attacks from external systems, is commonly known as ―penetration testing‖.
![Page 82: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/82.jpg)
66 Open Group Standard (2011)
Process OSP-19: Internal Technical Audit
Value Incidents arising from the exploitation of weaknesses in software and configuration weaknesses
around the borders of an organization can be prevented by attacks emulation and subsequent software mending, IT managed domain hardening, investment, and improved monitoring.
Documentation OSP-192: Attacks Emulation Procedure
OSP-193: Attack Emulation Report Template
OSP-194: Source Code Review Procedure
OSP-195: Source Code Review Report Template
OSP-196: User Registration and Access Control Review Procedure
OSP-197: User Registration and Access Control Review Report Template
OSP-198: Filtering Measures Procedure
OSP-199: Filtering Measures Report Template
GP-01C: Testing and Auditing Policy
Inputs Inventory of Assets (OSP-3)
Outputs Attack Emulation Report (OSP-4)
Source Code Review Report (OSP-8)
User Registration and Access Control Review Report (OSP-12, OSP-11)
Filtering Measures Report (TSP-4)
Metrics Report (TSP-4)
Quality Fraction of weakness found that are false negatives
Fraction of existing weakness that are not found (false negatives)
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Security Management (Tester), or Independent Auditor
Related Processes OSP-4: Information Systems IT Managed Domain Change Control
OSP-9: Security Measures Change Control
OSP-8: Software Development Lifecycle Control
OSP-11: Access Control
OSP-12: User Registration
OSP-14: Physical Environment Protection Management
OSP-16: Segmentation and Filtering Management
OSP-17: Malware Protection Management
Related
Methodologies
ISECOM OSSTMM
OWASP
4.5.6.2 OSP-20: Incident Emulation
Process OSP-20: Incident Emulation
Description This process validates the effectiveness of OSP-10: Backup Management, OSP-26: Enhanced
Reliability and Availability Management, OSP-15: Operations Continuity Management, which
protect against accidents, errors, and the failure of vulnerability reduction measures. This
process can be carried out by testing all the possible targets or a representative random sample
of them.
![Page 83: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/83.jpg)
Open Information Security Management Maturity Model (O-ISM3) 67
Process OSP-20: Incident Emulation
Value The impact of major incidents can be mitigated by incident emulation in which planned testing
is used to simulate an incident, walk-through its consequences, and improve emergency response and impact reduction measures.
Documentation OSP-101: Backup and Restore Test Plan
OSP-103: Restore Report Template
OSP-152: Operations Continuity Test Plan
OSP-153: Operations Continuity Test Report Template
OSP-264: Reliability and Availability Test Plan
OSP-265: Reliability and Availability Test Report Template
OSP-201: Incident Emulation Procedure
OSP-204: Incident Emulation Test Report
GP-01C: Testing and Auditing Policy
Inputs Information Security Targets (TSP-3)
Outputs Backup Test Report (OSP-10, OSP-15)
Enhanced Reliability and Availability Test Report (OSP-26, OSP-15)
Operations Continuity Test Report (OSP-15, GP-3)
Metrics Report (TSP-4)
Quality Number of restore tests of backups under emulated serious incident conditions
Number of emergency test of IT managed domains under emulated serious incident conditions
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Systems Management (Tester), or Information Security
Management (Tester), or Independent Auditor
Related Processes OSP-10: Backup Management
OSP-26: Enhanced Reliability and Availability Management
OSP-15: Operations Continuity Management
TSP-13: Insurance Management
Related
Methodologies
Not Applicable
4.5.6.3 OSP-21: Information Quality and Compliance Assessment
Process OSP-21: Information Quality and Compliance Assessment
Description Periodic review of classified information held to give assurance that it is complete, accurate, up-
to-date, and held for a specific purpose according to the law and the company ethics and
contracts. For example, records normally have specific accuracy requirements and personal
information must be held only when necessary for a specific purpose. This process can be carried out by testing all the possible targets or a representative random sample of them.
Value Incidents arising from the use or storage of information that is incomplete, inaccurate, expired,
wrongly labeled, or unethically or unlawfully held can be mitigated by an appropriately targeted
quality probing process.
Documentation OSP-211: Information Audit plan
OSP-212: Information Completeness, Precision, Update, and Fair-use Report Template
GP-01C: Testing and Auditing Policy
Fair Data Processing Legislation
![Page 84: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/84.jpg)
68 Open Group Standard (2011)
Process OSP-21: Information Quality and Compliance Assessment
Inputs Inventory of Assets (OSP-3)
Outputs Disclosures to public and commercial partners
Information Completeness, Precision, Update, and Fair-use Report (OSP-4)
Metrics Report (TSP-4)
Quality Fraction of information that belongs to a repository actually in the repository
Fraction of records in a repository accurate enough for their business purpose
Fraction of records in a repository updated enough for their business purpose
Fraction of repositories probed for fair use found held for a purpose and compliant with law and
ethics
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Systems Management (Tester), or Independent Auditor
Related Processes OSP-3: Inventory Management
OSP-4: Information Systems IT Managed Domain Change Control
OSP-8: Software Development Lifecycle Control
Related
Methodologies National data and privacy protection legislation, for example:
EU European Directives
USA HIPAA
USA Safe Harbor
USA Privacy Act
4.5.7 Monitoring
4.5.7.1 OSP-22: Alerts Monitoring
Process OSP-22: Alerts Monitoring
Description This process checks that Information Security Management is aware of new threats generated by
third parties, threats to third parties originating from the organization, weaknesses and fixes, and
is enabled to make informed decisions whether or not to change information system configuration or patch level, or even evolution of the management system.
Both employees and third parties can contribute to the discovery of weaknesses.
Value Incidents resulting from the exploitation of published weaknesses in products and software can be prevented by timely application of appropriate corrective measures.
Weakness in production systems discovered by employees or third parties needs corrective
action.
New threats might require changes in the ISMS.
Documentation OSP-221: Alerts Monitoring Procedure
OSP-222: Employee Weakness Reporting Procedure
OSP-223: Third-party Weakness Reporting Procedure (Public Document)
OSP-224: Alerts, Fixes, and Threats Report Template
GP-01B: Monitoring Policy
Inputs Weakness, Fixes, and Threats Reports (from external and internal sources)
Inventory of Assets (OSP-3)
![Page 85: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/85.jpg)
Open Information Security Management Maturity Model (O-ISM3) 69
Process OSP-22: Alerts Monitoring
Outputs Reviewed Alerts, Fixes, and Weaknesses Reports
Alerts, Fixes, and Threats Report (OSP-4)
Metrics Report (TSP-4)
Quality Fraction of alerts that are incorrectly deemed irrelevant (false negative)
Fraction of alerts that are incorrectly deemed relevant (false positive)
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Security Management
Related Processes OSP-4: Information Systems IT Managed Domain Change Control
OSP-9: Security Measures Change Control
OSP-8: Software Development Lifecycle Control
Related
Methodologies
Slave Virtual Router Redundancy Protocol (SVRRP)
4.5.7.2 OSP-23: Internal Events Detection and Analysis
Process OSP-23: Internal Events Detection and Analysis
Description This process covers the conversion into information of the data captured in event logs
(information system, physical access, and environmental conditions) and other sources like
decoys (e.g., honeypots). This information may lead to the detection of incidents, intrusions, and partial failures in redundant systems.
Employees can contribute to the discovery of incidents and intrusions.
Value Incidents must be detected before a response can be made in mitigation. Detection can depend
upon monitoring and analysis of events. If an incident is not detected, it may recur, or lead to
incidents with a higher impact, resulting in chronic damage to information systems and failure
to meet security targets.
Documentation OSP-231: Incident and Intrusion Detection Procedure
OSP-232: Incident Detection Report Template
OSP-233: Intrusion Detection Report Template
GP-01A: Incident Handling Policy
Inputs Events
Logs of Drops (OSP-16)
Logs of Pass (OSP-16)
Malware Detection and Cleaning Report (OSP-17)
Inventory of Assets (OSP-3)
Outputs Incidents and Intrusions Detected
Incident Detection Report (OSP-24, OSP-16, OSP-17, OSP-26, OSP-15, OSP-10)
Intrusion Detection Report (OSP-24, OSP-16)
Metrics Report (TSP-4)
Quality Percentage of Incident Detection Report that are false positives
Percentage of Intrusion Detection Report that are false positives
Percentage of incidents that are detected other than by process
Percentage of intrusions that are detected other than by process
![Page 86: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/86.jpg)
70 Open Group Standard (2011)
Process OSP-23: Internal Events Detection and Analysis
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Security Management
Related Processes OSP-16 , OSP-17, OSP-26, OSP-10
OSP-24: Handling of Incidents and Near-incidents
Related
Methodologies
Not Applicable
4.5.7.3 OSP-28: External Events Detection and Analysis
Process OSP-28: External Events Detection and Analysis
Description This process checks for:
Online opinions and attacks against the organization's reputation
Phishing and misrepresentation of the organization
Violation of copyrights
This process may take action of a technical or legal nature.
Employees, third parties, and specific search engines can contribute to the discovery of external
events.
Code obfuscation, watermarking, digital rights management, licensing controls techniques used to control the use of intellectual property in third-party information systems.
Value Reputation damage, phishing, misrepresentation of the organization, and violation of copyrights
should be prevented and mitigated.
Documentation OSP-281: External Incident Detection Procedure
OSP-284: Opinions and Attacks Report Template (from external and internal sources)
OSP-285: Phishing and Misrepresentation Report Template (from external and internal sources)
OSP-286: Copyright Violation Report Template (from external and internal sources)
GP-01B: Monitoring Policy
GP-01A: Incident Handling Policy
Inputs Opinions and Attacks Report (from external and internal sources)
Phishing and Misrepresentation Report (from external and internal sources)
Copyright Violation Report (from external and internal sources)
Inventory of Assets (OSP-3)
Outputs Reviewed Reports
Responses Report (OSP-4)
Incident Detection Report (OSP-24, OSP-16, OSP-17, OSP-26, OSP-15, OSP-10)
Intrusion Detection Report (OSP-24, OSP-16)
Metrics Report (TSP-4)
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Security Management
Related Processes OSP-16 , OSP-17, OSP-26, OSP-10
OSP-24: Handling of Incidents and Near-incidents
Related
Methodologies Not applicable
![Page 87: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/87.jpg)
Open Information Security Management Maturity Model (O-ISM3) 71
4.5.8 Incident Handling
4.5.8.1 OSP-24: Handing of Incidents and Near-incidents
Process OSP-24: Handling of Incidents and Near-incidents
Description This process aims to limit the impact of incidents and to gather information. The goals of
incident management are to:
Contain the effects of the incident, not including the recovery of repositories and information systems which is responsibility of OSP-10, OSP-15, and OSP-26
Gather data for forensics
Gather information to learn from the incident
Gather data to evaluate the impact and the security investment efficiency
Fraud is a very important type of incident. An alternate name for this process is OSP-24: Fraud
Handling, which is recommended for fraud-specific implementations.
Value Clear procedures for incident handling can help to mitigate the effects of an incident and prevent future recurrence.
Information on incidents, intrusions, and attacks should be used to improve the operation of
security measures, take decisions on security investment, and measure the efficiency of security measures.
Documentation OSP-242: Incident Response Procedure
OSP-243: Incident Report Template
OSP-244: Intrusion Report Template
GP-01A: Incident Handling Policy
Inputs Incident Detection Report (OSP-23)
Intrusion Detection Report (OSP-23)
Outputs Incidents and near-Incidents Handled
Incident Report (OSP-25, TSP-10)
Intrusion Report (OSP-25)
Metrics Report (TSP-4)
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Security Management
Related Processes OSP-23: Internal Events Detection and Analysis
OSP-25: Forensics
Related
Methodologies
ISO/IEC TR 18044:2004
4.5.8.2 OSP-25: Forensics
Process OSP-25: Forensics
Description This process investigates and diagnoses the sequence, authorship, classification, underlying
cause, and impact of incidents.
![Page 88: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/88.jpg)
72 Open Group Standard (2011)
Process OSP-25: Forensics
Value Incident investigation helps to prevent and mitigate future incidents by improving security
processes.
Forensic analysis of the information gathered in the incident handling phase can be used to:
Evaluate the incident
Identify corrective measures
Support prosecution of attackers, if appropriate
Documentation OSP-251: Forensics Assessment Procedure
OSP-252: Forensic Report Template
GP-01A: Incident Handling Policy
Inputs Incident Report (OSP-24)
Intrusion Report (OSP-24)
Outputs Investigated Incidents and Intrusions
Forensic Report (TSP-10, TSP-4, and for legal proceedings)
Metrics Report (TSP-4)
Quality Fraction of findings in Forensic Reports that are false negatives or false positives
Responsibilities Supervisor: TSP-14 Process Owner
Process Owner: Information Security Management
Related Processes OSP-24: Handling of Incidents and Near-incidents
Related
Methodologies Not Applicable
![Page 89: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/89.jpg)
Open Information Security Management Maturity Model (O-ISM3) 73
5 Outsourcing
5.1 Introduction
Many businesses find outsourcing of security management, either as a complete service or as
selected services within it, to be an appropriate solution for their business model.
These guidelines are general and not specific to an ISMS.
As described in Chapter 1, ITIL7 provides an established toolkit of process-related good
practices in the specific fields of IT service delivery and IT service management. ITIL users can
use the ISM3 process orientation to strengthen their ITIL security processes. ISM3 also has a
potential use in managing outsourced security processes; for example, Service Level Agreements
(SLAs) that use an ISM3 approach to operational metrics objectives and targets are specific and
measurable.
Of special interest when considering outsourcing security management services for ISM3
implementations are:
Service Level Agreements (SLAs) – key features to specify
Guidelines on preparing and awarding outsourcing contracts
5.2 Service Level Agreements
A Service Level Agreement (SLA) is a quality agreement between a process provider and a
customer, specified using a set of metrics. SLAs are often used to monitor and improve the
quality of service provided by an outsourcing provider. An SLA should include specifying the
items listed in the following table:
Service A description of the service offered by the outsourcing provider.
Scope Specific limitations to the service offered, like location, dates and times, lower and higher
load limits, language, etc.
Metrics List of metrics.
Bonuses and Penalties List of bonuses and penalties to apply for every metric staying or straying from Service
Level Objectives (SLOs).
Escalation Procedures Procedures to follow in case of SLOs being missed.
Reporting Frequency and content of service-level reports.
Operation Procedures Procedures to follow for requests, queries, warnings, and incident reports.
7 IT Infrastructure Library (ITIL), IT Service Management (ITSM); refer to: www.itil-itsm-world.com.
![Page 90: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/90.jpg)
74 Open Group Standard (2011)
For example, the following metric can be part of an SLA for an outsourced OSP-17: Malware
Protection Management process. The SLA should be completed with activity, scope,
unavailability, efficiency, effectiveness, and load metrics.
Metric PC antivirus update level
Metric Description This metric measures how updated are the computers with Microsoft Windows and corporative antivirus software installed.
Measurement
Procedure
The operator uses the query ―updatelevel.sql‖ to extract the current values from the
corporative antivirus server AVCORP. The query gives as an output the number of PCs
with every antivirus signature file installed. The counts of all the PCs with a signature file
older than three days are aggregated. The update level is calculated as the number of PCs
multiplied by how many days old is the signature installed, divided by the total of PCs.
Measurement
Frequency
Every Monday at 8:00 am local time
Service Level Objective
(SLO)
Update Level < 2.5 days
Target Value 1 day
Units 0.0 days
TSP-4: Service Level Management uses SLAs to manage outsourced ISM3 processes.
5.3 Guidelines
The following guidelines on outsourced services are recommended for ISM3 implementations:
1. The service should be defined in a contract and signed by legal representatives of both
parties who shall determine and agree on which country’s laws shall govern the contract.
2. The contract should include procedures to vary the services provided and a pricing
mechanism for agreed changes.
3. The service provider should:
a. Have a legal entity in the client’s country and have a physical address where it can
receive legal notification, if appropriate. Else, the client should be in possession of
a registered address of the service provider, the service to which address will
satisfy the requirement of legal notification being sufficiently served.
b. Provide the service in the language of the customer.
c. Avoid and declare conflicts of interests.
d. Employ qualified, trained, experienced, and committed commercial and technical
personnel who should behave according to all applicable legal requirements and
adhere to a formally announced and agreed upon ethical rules of conduct.
e. Manage personnel turnover through succession planning and minimal
dependencies on key personnel.
f. Provide a customer care desk with a single point of contact and means to track the
current state of incidents, change requests, and inquiries.
![Page 91: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/91.jpg)
Open Information Security Management Maturity Model (O-ISM3) 75
g. Inform the customer about:
Methodology used for the services provided
Performance in relation to provision of the service
Procedures in place to provide disaster recovery and business continuity
Any subcontracting of all or part of the service; the service provider
should be fully responsible for any mishap in the service caused by
subcontracted parties
Any circumstance that may affect the service negatively
h. Allow the customer to audit the service provided and co-operate as required with
such auditors as the customer appoints.
i. Provide information for benchmarking purposes at least once during the course of
the contract.
j. Hand over gracefully to another service provider if required at the end of the
contract.
4. The customer should:
a. Designate a relationship manager for the contract.
b. Provide clear security objectives and timely and relevant outputs from in-house
ISM processes.
c. Provide a contract help desk for its own employees to ensure that change requests
to the service provider are managed, monitored, and controlled.
d. Provide for regular meetings with the service provider to discuss performance.
e. Consider the use of a comprehensive security assessment on a periodic basis, to
better understand the service provider’s security posture. Significant guidance
regarding security and outsourcing is available from other industry organizations.
The BITS organization, which is affiliated with the Financial Industry
Roundtable, has published the Standardized Information Gathering spreadsheet
and associated procedures for management of security risks in outsourcing.
The following may serve as an outline for the content of the outsourcing proposal:
1. Goals of the service
2. Methodology of provision of the service
3. Scope of the service
4. Budget
5. Organization and communication
6. Resources (service provider and customer)
7. Security objectives and security targets relevant to the service
![Page 92: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/92.jpg)
76 Open Group Standard (2011)
8. Schedule of tasks, including phase in and eventual phase out of the service
9. Description of the service provided:
a. Scheduled service time (24x7, etc.) with detailed start and end time. Special dates
when the service is under certain limitation must be specified.
b. Overtime specified as time out of the scheduled service time, including the cost.
10. Underpinning Contract:
a. Bonuses and penalties specified in detail and unambiguously (a bail or insurance
policy may serve as a guarantee on the penalties becoming effective if necessary).
b. A mechanism for the costing and pricing of contract variations and additional
services.
c. A mechanism for metrics to be verified by an independent party.
11. Dependencies between the service provider and third parties, such as software and
hardware distributors or producers
12. Jurisdiction for the resolution of conflicts
![Page 93: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/93.jpg)
Open Information Security Management Maturity Model (O-ISM3) 77
6 Implementing ISM3
6.1 Top-Down or Bottom-Up
There are two main scenarios for implementing ISM3:
In a top-down implementation, an organization’s CxO-level executive management
decides to implement ISM3, and allocates appropriate resources to do so. In this scenario,
the security manager/project leaders responsible for implementing ISM3 work closely
with executive management to achieve their agreed security targets.
In a bottom-up implementation, an Information Security Manager or business domain
business manager within a larger organization decides to use existing resources to develop
a pilot ISM3 implementation, or a domain-level ISM3 implementation within their larger
organization. The objective may be to improve alignment and management of information
security processes or to demonstrate the value and Return on Investment (RoI) that ISM3
can yield as a cost-saving measure.
6.2 No One Solution Fits All
Every organization has a unique context and is constrained by the resources available.
Organizations using ISM3 use a decision-making process to put together a subset of processes
from the total hierarchy of processes available. Processes may run several times in an
organization under different process owners or in different IT managed domains.
6.3 Selecting the Processes to Implement
The set of processes chosen depends on:
The resources available
The size and the complexity of the organization
Requirements to conform to any certification scheme in use
Applicable regulatory and audit requirements
The risk tolerance of the organization and its possible sensitivity to financial and
reputational damage
Whether elements of risk or loss can be reduced by insurance or outsourcing
While it is normal business practice to mitigate the risk of financial loss – for example, by
outsourcing, or insurance – losses due to damage to brand/reputation usually remain with the
![Page 94: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/94.jpg)
78 Open Group Standard (2011)
business and can be severe, so mitigating risk to reputation is usually a high priority. Also, when
collaborating with other organizations or clients, a business needs to consider carefully the
balance of risk mitigation between themselves and those third parties; if the business is a main
contractor, it may bear sole responsibility for risk mitigation, whereas if a client procures some
of its needs elsewhere, responsibility may be more difficult to attribute.
The set of processes is determined firstly by the security policy (see Section 1.1), and secondly
by the resources available for investment and operations.
6.4 Processes Fundamental to Any ISM3 Implementation
The following processes are considered essential to any functioning ISMS, and should be
considered as the initial set of processes for any top-down implementation:
GP-1: Knowledge Management
GP-3: ISM Design and Evolution
SSP-1: Report to Stakeholders
SSP-2: Coordination
SSP-6: Allocate Resources for Information Security
TSP-1: Report to Strategic Management
TSP-2: Manage Allocated Resources
TSP-3: Define Security Targets
TSP-4: Service-Level Management
OSP-1: Report to Tactical Management
OSP-5: IT Managed Domain Patching
OSP-11: Access Control
OSP-16: Segmentation and Filtering Management
OSP-17: Malware Protection Management
OSP-10: Backup Management
OSP-21: Information Quality and Compliance Probing
6.5 Guidance on the Role of Key Groups of ISM3 Processes
As a general guide, based on the experience of members of The Open Group, the table below
groups a number of ISM3 processes by the estimated magnitude of investment required and the
expected benefit in terms of risk reduction. These groupings indicate the ratio of cost/benefit that
might be achieved in a typical implementation. The processes are grouped in sets of associated
![Page 95: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/95.jpg)
Open Information Security Management Maturity Model (O-ISM3) 79
processes, where the inputs of one are the outputs of another, or are otherwise logically related.
Careful analysis of ISM3 processes as related to each organization’s individual circumstances is
critical to understanding which ISM3 processes will yield the most benefit in risk reduction, at
the lowest cost.
Low Investment Medium Investment High Investment
High
Benefit
OSP-12: User Registration
SSP-4: Define TPSRSR Rules
TSP-6: Define IT Managed
Domains and Lifecycles
GP-2: ISM System and
Business Audit
OSP-14: Physical Environment
Protection Management
OSP-7: IT Managed Domain Hardening
OSP-8: Software Development
Lifecycle Control
OSP-19: Internal Technical Audit
OSP-4: Information Systems IT
Managed Domain Change Control
OSP-9: Security Measures Change Control
OSP-26: Enhanced Reliability and
Availability Management
Medium Benefit
TSP-11: Security Awareness
TSP-8: Personnel Security
TS8P-:9 Security Personnel
Training
OSP-3: Inventory Management
OSP-2: Security Procurement
OSP-6: IT Managed Domain
Clearing
OSP-27: Archiving Management
OSP-15: Operations Continuity Management
OSP-20: Incident Emulation
Low
Benefit
TSP-10: Disciplinary Process
TSP-13: Insurance
Management
OSP-22: Alerts Monitoring
OSP-28: External Events
Detection and Analysis
OSP-23: Internal Events
Detection and Analysis
OSP-24: Handling of Incidents
and Near-incidents
OSP-25: Forensics
TSP-7: Background Checks
TSP-14: Information Operations
Table 3: Varying Returns on Investment of Different Processes
Readers should be careful to note that this table does not in any way attempt to depict absolute
levels of benefit and investment. The intention instead is that it prompts organizations to think
through the relative costs and benefits of ISM3 processes, depending on their business’ unique
circumstances.
6.6 Top-Down Implementation
The following steps should be taken for top-down initial implementation:
1. Obtain management commitment
2. Name CISO and set up Executive Security Committee and Information Security
Committee8
3. Determine ISM3 target maturity and capability level (if any)
4. Determine any regulatory requirements (e.g., Basel II, USA SoX, Spain LOPD)
8 The Information Security Committee should include representatives of all stakeholder business units covered by the
proposed ISMS.
![Page 96: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/96.jpg)
80 Open Group Standard (2011)
5. Determine additional certification requirements (e.g., ISO/IEC 27001:2005, SAS70, ISM3
Certifiable Maturity Levels)
6. Assessment/gap analysis between the current ISMS and ISM3-based ISMS
7. Set up GP-1: Knowledge Management (it can be based on current ISO 9001:2000
infrastructure)
8. The Executive Security Committee determines the implementation strategy
9. Set up Strategic Management processes:
— Determine the Business, Personnel, and Compliance security objectives based on
regulatory, certification, and business goals
— Determine the information security budget
10. Set up selected Tactical Management processes, including GP-3: ISM Design and
Evolution:
— Determine the Access Control, Priority, Durability, Information Quality, and
Technical-related security objectives
— Determine the logical IT managed domains and lifecycles
— If certification is sought, determine ISMS scope of certification and boundaries, with
rationale for inclusion and exclusion
— Classify repositories and services according to security objectives; name system
owners
— Set the security targets per IT managed domain
— Select appropriate operational processes per IT managed domain
11. Determine metrics for each process depending on the capability level sought
12. Set up or outsource operational ISM processes
13. Assign responsibilities
14. Design and document (using GP-1: Knowledge Management) the ISM3-based ISMS:
— Agreements, including SLAs for outsourced processes
— Policies
— Procedures
— Templates
— Reports
15. Create and publish Information Security Policies using GP-3: ISM Design and Evolution
16. Train management and users on their ISMS responsibilities using TSP-9: Security
Personnel Training
![Page 97: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/97.jpg)
Open Information Security Management Maturity Model (O-ISM3) 81
17. Review operation of all processes using TSP-4: Service-Level Management
18. Revise security targets using TSP-3: Define Security Targets
19. Operate the ISMS
20. Define and refine the process metrics thresholds using TSP-4: Service-Level Management
21. Audit the ISMS periodically using GP-2: ISMS and Business Audit
22. Optionally, certificate the ISMS as per certification requirements
23. Maintain and improve the ISMS using GP-3: ISM Design and Evolution
A top-down implementation might aim for specific maturity levels. Some examples of maturity
levels are given in Chapter 6.8.
6.7 Bottom-Up Implementation
The following steps should be taken for bottom-up initial implementation:
1. Set up GP-1: Knowledge Management (it can be based on current ISO 9001:2000
infrastructure)
2. Apply existing policies and knowledge of the business to draft security objectives
3. Classify repositories and services according to security objectives; name system owners
4. Set the security targets for each IT managed domain
5. Select appropriate operational processes for each IT managed domain
6. Determine metrics for each process depending on the capability level sought
7. Set up operational ISM processes
8. Assign responsibilities
9. Design and document (using GP-1: Knowledge Management) the processes:
— Procedures
— Templates
— Reports
10. Review operation of all processes using TSP-4: Service-Level Management
11. Revise security targets using TSP-3: Define Security Targets
12. Operate the ISMS
13. Define and refine the process metrics thresholds using TSP-4: Service-Level Management
14. Maintain and improve the ISMS using GP-3: ISM Design and Evolution
![Page 98: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/98.jpg)
82 Open Group Standard (2011)
6.8 Examples of ISM3 Maturity Levels
The following tables specify the capability and process composition of sample maturity levels.
They offer suggestions on how to get started using ISM3.
Note:
The terms ―managed‖ and ―optimized‖ in these tables are defined in Section 2.1.1.
These tables offer suggestions for guidance only; they will be modified by the
requirements of the business deploying ISM3.
A maturity level is determined by the process composition and the capability of each process.
If two ISMSs have the same process composition, and one of them has higher capability,
it will be considered more mature. In the example table, Level 5 has a higher maturity
than Level 4 for this reason.
If two ISMSs have the same capability levels, and one has more processes than the other,
it will be considered more mature; Level 4 has a higher maturity than Level 3 for this
reason. These examples are suggestions to get started using ISM3.
6.8.1 General
Level 1 Level 2 Level 3 Level 4 Level 5
GP-1: Knowledge Management Managed Managed Managed Managed Optimized
GP-2: ISMS and Business Audit Managed Managed Managed Managed Optimized
GP-3: ISM Design and Evolution Managed Managed Managed Managed Optimized
6.8.2 Strategic Management
Level 1 Level 2 Level 3 Level 4 Level 5
SSP-1: Report to Stakeholders Managed Managed Managed Managed Optimized
SSP-2: Coordination Managed Managed Managed Managed Optimized
SSP-4: Define TPSRSR Rules Managed Optimized
SSP-6: Allocate Resources for
Information Security
Managed Managed Managed Managed Optimized
6.8.3 Tactical Management
Level 1 Level 2 Level 3 Level 4 Level 5
TSP-1: Report to Strategic Management Managed Managed Managed Managed Optimized
TSP-2: Manage Allocated Resources Managed Managed Managed Managed Optimized
TSP-3: Define Security Targets Managed Managed Managed Managed Optimized
TSP-4: Service-Level Management Managed Managed Optimized
TSP-6: Define Environments and
Lifecycles
Managed Managed Managed Optimized
![Page 99: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/99.jpg)
Open Information Security Management Maturity Model (O-ISM3) 83
Level 1 Level 2 Level 3 Level 4 Level 5
TSP-13: Insurance Management Managed Optimized
TSP-7: Background Checks Managed Optimized
TSP-8: Personnel Security Managed Optimized
TSP-9 Security Personnel Training Managed Managed Optimized
TSP-10: Disciplinary Process Managed Managed Managed Optimized
TSP-11: Security Awareness Managed Managed Managed Optimized
TSP-14: Information Operations Optimized
6.8.4 Operational Management
Level 1 Level 2 Level 3 Level 4 Level 5
OSP-1: Report to Tactical Management Managed Managed Managed Managed Optimized
OSP-2: Security Procurement Managed Managed Managed Optimized
OSP-3: Inventory Management Managed Managed Optimized
OSP-4: Information Systems Environment Change Control
Managed Managed Managed Optimized
OSP-5: Environment Patching Managed Managed Managed Managed Optimized
OSP-6: Environment Clearing Managed Managed Managed Optimized
OSP-7: Environment Hardening Managed Managed Managed Optimized
OSP-8: Software Development Lifecycle
Control
Managed Managed Optimized
OSP-9: Security Measures Change Control
Managed Managed Managed Optimized
OSP-16: Segmentation and Filtering
Management
Managed Managed Managed Managed Optimized
OSP-17: Malware Protection
Management
Managed Managed Managed Managed Optimized
OSP-11: Access Control Managed Managed Managed Optimized
OSP-12: User Registration Managed Managed Managed Optimized
OSP-14: Physical Environment
Protection Management
Managed Managed Managed Optimized
OSP-10: Backup Management Managed Managed Managed Managed Optimized
OSP-26: Enhanced Reliability and
Availability Management
Managed Optimized
OSP-15: Operations Continuity Management
Managed Managed Optimized
OSP-27: Archiving Management Managed Optimized
OSP-19: Internal Technical Audit Managed Managed Managed Optimized
OSP-20: Incident Emulation Managed Managed Optimized
![Page 100: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/100.jpg)
84 Open Group Standard (2011)
Level 1 Level 2 Level 3 Level 4 Level 5
OSP-21: Information Quality and
Compliance Probing
Managed Optimized
OSP-22: Alerts Monitoring Managed Managed Managed Optimized
OSP-28: External Events Detection and
Analysis
Managed Optimized
OSP-23: Internal Events Detection and Analysis
Managed Optimized
OSP-24: Handling of Incidents and Near-
incidents
Managed Managed Optimized
OSP-25: Forensics Managed Optimized
![Page 101: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/101.jpg)
Open Information Security Management Maturity Model (O-ISM3) 85
A Index of Processes
Process Type Process Name Code
Definition
in Section
Generic Knowledge Management GP-1 4.2.1
System Audit GP-2 4.2.2
Implementing ISM3 GP-3 4.2.3
Strategic
Management
Report to Stakeholders SSP-1 4.3.1
Co-ordination SSP-2 4.3.2
Define Division of Duties Rules SSP-4 4.3.3
Allocate Resources for Information Security SSP-5 4.3.4
Tactical Management
Report to Strategic Management TSP-1 4.4.1
Manage Allocated Resources TSP-2 4.4.2
Define Security Targets & Security Objectives TSP-3 4.4.3
Security Architecture TSP-6 4.4.4
Service Level Management TSP-4 4.4.5
Insurance Management TSP-13 4.4.6
Personnel Security:
Background Checks – new employees
Personnel Security – existing employees
Security Personnel Training
Disciplinary Process
Security Awareness
TSP-7
TSP-8
TSP-9
TSP-10
TSP-11
4.4.7.1
4.4.7.2
4.4.7.3
4.4.7.4
4.4.7.5
Information Operations TSP-14 4.4.8
Operational
Management
Report to Tactical Management OSP-1 4.5.1
Security Procurement OSP-2 4.5.2
Lifecycle Control:
Inventory Management
IT Managed Domain Change Control
IT Managed Domain Patching
IT Managed Domain Clearing
IT Managed Domain Hardening
Software Development Lifecycle Control
Security Measures Change Control
Segmentation and Filtering Management
Malware Protection Management
OSP-3
OSP-4
OSP-5
OSP-6
OSP-7
OSP-8
OSP-9
OSP-16
OSP-17
4.5.3.1
4.5.3.2
4.5.3.3
4.5.3.4
4.5.3.5
4.5.3.6
4.5.3.7
4.5.3.8
4.5.3.9
![Page 102: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/102.jpg)
86 Open Group Standard (2011)
Process Type Process Name Code
Definition
in Section
Access and Environmental Control:
Access Control
User Registration
Physical Environment Protection Management
OSP-11
OSP-12
OSP-14
4.5.4.1
4.5.4.2
4.5.4.3
Availability Control:
Backup Management
Operations Continuity Management
Enhanced Reliability and Availability Management
Archiving Management
OSP-10
OSP-15
OSP-26
OSP-27
4.5.5.1
4.5.5.2
4.5.5.3
4.5.5.4
Testing and Auditing:
Internal Technical Audit
Incident Emulation
Information Quality and Compliance Assessment
OSP-19
OSP-20
OSP-21
4.5.6.1
4.5.6.2
4.5.6.3
Monitoring:
Alerts Monitoring
Internal Events Detection and Analysis
External Events Detection and Analysis
OSP-22
OSP-23
OSP-28
4.5.7.1
4.5.7.2
4.5.7.3
Incident Handling:
Handling of Incidents and Near-incidents
Forensics
OSP-24
OSP-25
4.5.8.1
4.5.8.2
![Page 103: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/103.jpg)
Open Information Security Management Maturity Model (O-ISM3) 87
B Terms and Definitions
B.1 Processes and Document Codes
Process types are represented in the form, XYP, where:
X is G (generic) or S (specific).
When X stands for Specific, Y is S (strategic), T (tactical), or O (operational).
P indicates a process.
Document names are represented in the form: XYP-NNN, where XYP is the process code and
NNN an identifier. If the process code is one digit long, X=0.
Words followed by an acronym in brackets [ ], refer to an existing publication or standard.
Outputs in italics are non-documentary outputs.
B.2 Components of Information Systems
Information systems are complex and have a variety of tangible and intangible components.
System components can be classified at the chosen level of abstraction according to their
structural and transactional features.
Structural Features
Structural features are the various assets from which an information system may be built:
Repositories: Any temporary or permanent storage of information, including RAM,
databases, file systems, and any kind of portable media.
Interfaces: Any input/output device, such as screens, printers, and fax.
Channels: Physical or logical pathways for the flow of messages, including buses, LAN
networks, etc. A network is a dynamic set of channels.
Borders: Define the limits of the system.
Physical devices can host one or many logical components. Structural objects exist in every
logical and physical level. The table below contains examples of each type of structural asset:
Repository Interface Channel
Payroll Database Web-based interface HTTPS
Database Replica System call TCP
![Page 104: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/104.jpg)
88 Open Group Standard (2011)
Repository Interface Channel
File System Monitor, keyboard, and mouse Frame relay PVC
Hard Drive Connector Cable
When defining security requirements, policies, or procedures, an organization should use asset
description levels appropriate to the threats faced. The OSI model can be used to select an
appropriate level of detail. For example, most organizations will draft policies relating to the
security of high-level channels (such as OSI Level 7 and above). Some organizations may be at
risk from interception of a low-level channel (OSI Level 1), such as infra-red on a wireless
keyboard, and have specific policies for infra-red channel.
Transactional Features
Transactional features are the various assets from which an information system produces actual
results:
Services: Any value provider in an information system, including services provided by
BIOS, operating systems, and applications. A service can collaborate with other services
or lower-level services to complete a task that provides value, like accessing information
from a repository.
Sessions: A temporary relationship of trust between services. The establishment of this
relationship can require the exchange of credentials.
Messages: Any meaningful information exchanged between two services or a user and an
interface. Requests are special messages used by services to change the state of
information system components. Requests fall into one of the following categories:
Component State: Initiate Finalize Freeze Unfreeze Query State Change State
Transition:
Repository create delete block unblock read write
Interface connect disconnect interrupt continue read write
Channel open close hold release read write
Session login logout suspend resume read write
Message send listen retain forward read write
Service start stop pause go read write
Note X: The request ―listen‖ can be understood as ―receive‖ or ―detect‖, but for simplicity, only
the word ―listen‖ is used.
Note XI: If the repository is RAM-like ―block‖ and ―unblock‖ are equivalent to ―allocate‖ and
―free‖.
Transactional assets are dynamic, such as running processes, moving messages, and live
sessions. Static assets such as mail, program files, or credentials stored in a repository are not
considered either a message or a service. Transactional objects exist in every logical and
physical level. The table below contains examples of each type of transactional asset:
![Page 105: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/105.jpg)
Open Information Security Management Maturity Model (O-ISM3) 89
Service Message Session
Bank Account Transfer from another account Work session between user and application
SOAP API Interface SOAP Call Session between processes
Port TCP Packet TCP transmission session
Ethernet Port Ethernet Packet Frame transmission session
B.3 Lifecycles and IT Managed Domains
Depending on the mission, size, and physical environment of an organization, there may be a
number of different logical IT managed domains. Systems going through the different states that
make up their lifecycle often change the structure of the IT managed domain.
In ISM3, an IT managed domain is a set of systems with a defined lifecycle under the same
management/process owner. Lifecycle control processes are used to mitigate particular threats to
systems and security measures. In particular, control processes are expected during the
transitional period when a system is moving from one stage to another. Different IT managed
domains will have their own security objectives and their own instances of ISM processes. Every
process may have different thresholds for process metrics and security targets, which helps to
adapt the process to the needs of the IT managed domain. This helps to optimize the drawbacks
of targeting a high level of protection in all IT managed domains just because one of them needs
that protection. The following are examples of common logical IT managed domains, with
examples of the states that make up their lifecycles:
Internal/user IT managed domain:
— Reception
— Delivery
— Operation
— Change of ownership
— External maintenance
— Retirement
— Sale
— Theft
Mobile/remote user IT managed domain:
— Reception
— Delivery
— Operation
— Change of ownership
— Change of location and connection
![Page 106: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/106.jpg)
90 Open Group Standard (2011)
— External maintenance
— Retirement
— Sale
— Theft
Internal/server IT managed domain:
— Concept
— Development or selection and acquisition
— Operation
— Maintenance
— Retirement
Services development IT managed domain:
— Requirements
— Analysis
— Design
— Build
— Test
— Configuration
— Deployment
Lifecycles are not always linear or cyclical. Certain events can shift an object from one state to
another, in a non-linear or non-cyclical fashion.
The following graph represents very common IT managed domains. The IT managed domains in
black are trusted; the IT managed domains in red are not trusted. While the boundary between
the DMZ and the third-party network is a third-party connection, the boundary between users
and WiFi networks is a physical one (external WiFi networks across the street). Mobile users can
sometimes connect directly to the internal network through the DMZ, and can sometimes access
the Internet directly.
![Page 107: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/107.jpg)
Open Information Security Management Maturity Model (O-ISM3) 91
![Page 108: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/108.jpg)
92 Open Group Standard (2011)
C ISM3 and ISO/IEC 27000
This appendix is intended as a commentary on how ISM3 can be used with ISO/IEC 27000:2009
to provide significant benefits.
ISO/IEC 27000 is frequently used as the gold standard for security controls – it defines what an
organization should do. In terms of security systems, these security controls are usually
configured with security standards sitting below the security policy.
The outstanding value that ISO/IEC 27000 has contributed to improving information security in
IT-dependent businesses worldwide is unquestioned and unchallenged. In the same spirit, the
demands for ever-improved information security solutions to combat the damaging threats from
today's and tomorrow's highly sophisticated hackers and their industrial espionage and cyber-
terrorist exploits using ever-increasing skills at exposing vulnerabilities in information systems,
require information security practitioners to develop, implement, and manage ever-more capable
defense mechanisms. It is with this in mind that ISM3 offers a similar but different approach to
information security management, including adding the concept of an ISM's maturity.
The common approach that all recognized ISMSs use is:
What processes an organization should implement to protect its information assets
ISO/IEC 27001:2005 defines a process for what is required to build an ISMS – leaving
implementers to define the component processes themselves.
What controls are appropriate to provide that protection.
ISO/IEC 27002:2005 outlines a large number of potential controls and control
mechanisms from which to choose to achieve selected control objectives using the
guidance provided by ISO/IEC 27001.
ISM3 covers the same ground. It addresses the requirement (what?), the purpose (why?), and the
method (how?). It uses an approach that also defines a comprehensive framework for selecting,
implementing, and managing a set of security processes to meet measurable business goals. It
breaks security management down into a number of related activities, in which each security
activity is defined as a process, with its own related environment, responsibilities, security
control(s), documentation, inputs, outputs, metrics, and linkages to other explicitly defined
activities. A key feature of ISM3 is that every ―control‖ needs a ―process‖ for managing it, so it
breaks information security management down into a comprehensive but manageable number of
processes, with specifically relevant security control(s) being identified as an essential subset
within each process.
An ISO/IEC 27001 organization using ISM3 can build the required control objectives into the
ISM3 statement of security objectives and link them to process responsibilities. In doing this, the
ISM3 model would guide the way the controls are selected, assigned to owners, and measured,
managed, and improved through use. Mapping ISM3 and ISO/IEC 27001 reveals several ISM3
![Page 109: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/109.jpg)
Open Information Security Management Maturity Model (O-ISM3) 93
process control objectives that are not addressed in ISO/IEC 27001, while all ISO/IEC 27001
are addressed by ISM3. Additionally, using ISM3 while designing a system architecture ensures
that security considerations are cascaded through the design, complete with reporting linkages,
identified dependencies, and measurement points.
Metrics are an integral part of ISM3, and are addressed in ISO/IEC 27004:2009. ISM3 metrics
are focused on the objectives of the specific process requirements and control(s) they service.
They have an emphasis on measurement of trends and variability. Also, they are often leading
indicators related to the probability of an incident. The use of leading indicators enables short-
cycle improvement; this contrasts with lagging indicators from pen-testing, where improvement
is normally a long cycle, between 3-12 months. For example, in the measurement of the
proportion of user terminals with up-to-date software, a deterioration of the proportion would be
a flag that incident risk was rising. Metrics-led improvement leads to all-around improvements,
whereas pen-test compliance improvement leads to compliance improvements only. Also, point-
in-time metrics that install to the standard and then rely on pen-testing for proof, or focus on
absolute inputs and outputs over a period, are usually lagging indicators. For example,
organizations using ISO/IEC 27000 and PCI-DSS-based standards aim to implement and prove
technical standards to meet each of the required control objectives. You can measure the extent
of compliance against the standard using the documentation, and back it up with pen-testing. On
their own, ISO/IEC 27000 and PCI-DSS carry the risks that an ISMS is unresponsive to
environmental changes, that variability in performance is unknown, and that problems can only
be identified by an incident. That is why pen-testing is so often an essential part of the assurance
model.
In line with ISO/IEC 27001:2005, ISM3 seeks to understand the organization's information
security requirements and to align the ISMS with business needs. It does this by requiring
business managers to state their sensitivity to various categories of security incident. The
security objectives that result set the standard for identifying security incidents and measuring
performance of the ISMS. This approach fairly and transparently sets out the expectations and
responsibilities of the security team.
In contrast to ISO/IEC 27001:2005, ISM3 does not specify control objectives and required
controls for each process. These are selected at the discretion of the organization's management,
in line with their business goals and responses to the risks and reporting requirements they face.
This stance enables an ISO/IEC 27001-compliant organization to leverage the clarity of purpose
that ISM3 gives to security activities.
![Page 110: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/110.jpg)
94 Open Group Standard (2011)
Glossary
Access Any exchange of a message between an interface, repository, or service.
Access Control
The set of user registration, authentication, authorization, signing, and recording
processes used to ensure authorized access and to prevent unauthorized access to
resources relevant to information security based on the business and security
requirements.
Access Right
A class of access to a repository, service, or interface that can be granted or
revoked.
Accident A class of incident with non-human natural causes.
(There is no [ISO] equivalent.)
Activity Set of actions performed to achieve a particular result.
Agreement A documented understanding between two or more parties.
Alarm A set of events likely to be caused by an incident.
Alert A warning of a possible weakness or type of weakness, a new threat, or a measured
value of a metric going beyond defined thresholds.
(Not equivalent to [ISO] alert. Similar to [ITIL] alert.)
Asset Any valuable property of the organization.
Attack A class of incident with an intentional human cause.
(Not equivalent to [ISO] attack: ―An attempt to exploit a vulnerability‖.)
Audience Group of authorized users of an interface, service, or repository.
Audit Criteria
Set of policies, procedures, or requirements. Audit criteria are used as a reference
against which audit evidence is compared.
Audit Evidence
Records, statements of fact, or other information, which is relevant to the audit
criteria and verifiable. Audit evidence may be qualitative or quantitative.
Auditor Person external to the organization with the skills to conduct an audit on behalf of a
process owner or customer.
Authentication
Process that links the use of user accounts with their owner and manages the
lifecycle of sessions.
![Page 111: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/111.jpg)
Open Information Security Management Maturity Model (O-ISM3) 95
Authority The technical person who implements approved access requests.
Authorization
Process that grants the use of services and interfaces and access to repositories to
authorized and authenticated users and denies it to unauthorized users.
Authorizer A delegate of an information system owner who can approve or deny access
requests to interfaces, repositories, channels, and services of an information system.
Availability The period of time when a process must be performed as expected upon demand
with minimal or no interruptions.
The period of time when a service, interface, or channel must be accessible and
usable upon demand with minimal or no interruptions.
Border A boundary between two IT managed domains.
Catastrophe Any incident that could result in an organization’s demise.
Certificate A credential based on public key cryptography techniques.
A credential of being compliant with some standard or regulation.
Certification Body/Registration Body
A third party that assesses and certifies/registers the Information Security
Management Systems (ISMS) of an organization with respect to published ISMS
standards, and any supplementary documentation required under the system.
Certification Document/Registration Document
Document indicating that an organization's ISMS conforms to specified ISMS
standards and any supplementary documentation required under the system.
Certification System/Registration System
System having its own rules of procedure and management for carrying out the
assessment leading to the issuance of a certification/registration document and its
subsequent maintenance.
Channel The medium used by services to exchange messages transparently, without explicit
help from other lower-level services. This collaboration is normally needed for
creating and closing logical channels.
Client An information system that uses a service provided by another information system.
Common Cause
A non-assignable cause for a metric going beyond current thresholds, which may be
a stochastic or chance effect.
Configuration Item
A service, repository, channel, interface, or set of them in cases where they are not
divisible.
![Page 112: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/112.jpg)
96 Open Group Standard (2011)
Configuration Management Database
A database that contains the details of configuration items and their relationships.
Control Any kind of measure that can prevent, detect, and correct undesired events.
(Equivalent to [COBIT] control.)
Credential An item used for authentication of a user account in an access control system.
Critical A service is critical in a time span if the interruption of the service for that span of
time cannot be replaced by alternative capabilities, and is highly likely to jeopardize
business goals.
Customer He who provides the resources and sets the requirements for the process.
(Equivalent to [COBIT] and [CMMI] customer.)
Device Instrument, software, measurement standard, reference material, auxiliary
apparatus, or combination thereof used to measure a process metric.
Digital Signature
A type or record that includes the will and intent of a user about a repository. It
might be hidden using watermarking techniques.
Disaster See Catastrophe.
Efficiency Ratio between the number of outputs produced and the resources used given a
certain input.
Effectiveness
Ratio of outputs produced in comparison to the theoretical maximum.
Error A class of incident caused by a human because of a mismatch between the intended
and the effective results of a task, or because of incorrect information or missing
resources needed for the task.
(There is no [ISO] equivalent. Similar to [ITIL] error.)
Event Any fact that can lead to the detection of an incident.
(Equivalent to [ISO] alert. Similar to ITIL event.)
Expectation Any hope for the future state of assets, organizational processes, or information
systems.
Exposure Any weakness that is visible to potential attackers.
Fault Synonym for error.
Fraud An attack performed using deception techniques.
Generic Goal
A goal achieved when a set of specific goals are achieved.
Generic Practice
An auxiliary process to a specific practice to achieve a generic goal.
![Page 113: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/113.jpg)
Open Information Security Management Maturity Model (O-ISM3) 97
Impact The direct and indirect cost of an incident including the cost of restoring the assets
to the pre-incident state.
(Similar to [ITIL] impact.)
Incident A failure to meet a security objective resulting from accidents, errors, or attacks.
(There is no [ISO] equivalent. Not equivalent to [ITIL] incident. Not equivalent to
[COBIT] incident.)
Indicative Equipment
A device that delivers qualitative information.
Information System
A human and technical infrastructure for the storage, processing, transmission,
input, and output of information.
Information System Owner
The customer [ITIL] of an information system, who has all the rights to the system,
including discontinuation.
Input Specifications
Procedures and policies that specify the requirements for the input of a process.
Inputs The resource needed to generate the output of a process for which there are no
possible alternatives.
Intellectual Property
Information which an organization has rights over under copyright, trademark, or
patent law.
Interface A means of information input or output between a user and an information system.
Intrusion The theft of information about a target by an attacker.
IT Managed Domain
A technical zone of the organization with a defined purpose, like the server
environment, user environment, development environment, etc.
Any subdivision of a logical, technical, or organizational partition under a single
management.
Key Goal Indicator
A metric of success of a process or management system.
(Similar to [COBIT] key goal indicator.)
Key Performance Indicator (KPI)
A metric of performance success of a process or management system.
(Similar to [COBIT] key performance indicator.)
Knowledge A model of the structure, behavior, and boundaries of a type of system, and the set
of rules that it follows, making it possible to explain past behavior, and predict
future behavior and changes in structure of the system.
![Page 114: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/114.jpg)
98 Open Group Standard (2011)
License An agreement that details the rights granted by an intellectual property owner to use
certain information.
Lifecycle The set of states that make up a series of operational conditions of an information
system.
Logging See Recording.
Login Beginning of a session, normally using a credential for authentication. Also called
logon.
Logo A symbol used by a body as a form of identification, usually stylized. A logo may
also be a mark.
Logout End of a session by the user account or by expiration. Also called logoff.
Management
To manage something is to define and achieve goals while optimizing the use of
resources.
Mark A legally registered trademark or otherwise protected symbol which is issued under
the rules of a certification body or of a certification/registration body indicating that
adequate confidence in the systems operated by a body has been demonstrated or
that relevant products or individuals conform to the requirements of a specified
standard.
Mean Time Between Failures
The average time between two failures of an information system.
Mean Time to Repair
The average time taken to restore an information system after a failure.
Measurement
Considers the determination of a physical quantity, magnitude, or dimension (using
measuring equipment) at a single point in time.
Measuring Equipment
A device that delivers quantitative information.
Message Meaningful data exchanged between services in a hierarchical or peer-to-peer
fashion.
Metric A quantitative measurement that can be interpreted in the context of a series of
previous or equivalent measurements.
Network A set of physical or logical channels connecting repositories and interfaces.
Node An information system whose primary function is relay messages between
channels.
(Not equivalent to [ISO] node.)
![Page 115: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/115.jpg)
Open Information Security Management Maturity Model (O-ISM3) 99
Non-repudiation
The ability to assert the authorship of a message or information authored by a
second party, preventing the author to deny his own authorship.
Non-conformity
The absence of, or the failure to implement and maintain, one or more required
management system elements, or a situation which would, on the basis of objective
evidence, raise significant doubt as to the capability of the ISMS to achieve the
business objectives of the organization.
Operational Level Agreement (OLA)
SLA between a process provider and a customer from the same organization who is
a process provider to other customers.
(Equivalent to [ITIL] OLA.)
Operational Process (OP)
A process that delivers the requirements set by tactical management.
Opportunity The combination of an asset, threat, and occasion that may give rise to an incident.
Organization
A group of people that agree or accept responsibilities to act together with a
common purpose. Associations, companies, and public institutions, for example, are
organizations.
Output Objective results of a process.
Output Specifications
Procedures and policies that specify the requirements for the output of a process.
Partition Any subdivision of a whole that does not intersect totally or partially any other
subdivision.
Performance
Comparison between the outputs obtained and the set goals for outputs of a process.
Policy Documented rules to observe during implementation and maintenance that serve as
governing principles when procedures are not detailed enough for a minority of
cases.
Personal Information
Information that can identify a person.
Private Information
See Personal Information.
Problem A cause of several non-simultaneous errors or accidents.
Process An organized set of tasks with a common goal that uses resources and inputs to
produce valuable outputs.
![Page 116: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/116.jpg)
100 Open Group Standard (2011)
Process Operator
Person or team that performs a process.
Process Owner
The person or team responsible for a process, including performance, prioritizing,
planning for growth, and accounting for costs.
(Not equivalent to [CMM] process owner.)
Process Specification
Procedures and policies that specify the requirements for a process.
Provider The process owner of a process that delivers its outputs.
Quality The meeting or surpassing of expectations.
Record A particular instance result of logging, including details like interface ID and
location, user account or certificate ID, signature, type, date and time of access
attempt, access attempt result, repository, interface, service or message accessed,
etc.
Recording The process that registers the results of the user registration, authentication,
authorization, use of systems, and signing processes, so these can be investigated
and the will and intent or responsibilities determined.
Recovery Point
Point in time when business processes or information systems can fall back in case
of an incident.
Registration Body
See Certification Body.
Registration Document
See Certification Document.
Registration System
See Certification System.
Reliability The fraction of the availability time a service, interface, or channel must behave and
produce results as intended.
Repository Any permanent or transient storage of information.
Resilience The ratio between the Mean Time Between Failure (MTBF) of a functionally-
equivalent redundancy free system and the MTBF of the system.
Resource A resource is anything needed to complete a task. Most resources stop being
available to other tasks while they are being used. Some resources are exhausted
after the task and cannot be re-used. Some fundamental resources are: energy;
hardware, software, communication; information (logistic, organizational,
procedural, technical, policy, contracts); logistics and infrastructure; money;
people; space; time.
![Page 117: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/117.jpg)
Open Information Security Management Maturity Model (O-ISM3) 101
Responsibility
An assignment of a task, with power and resources, to a competent individual or a
team accountable for the proper execution of the task.
Responsiveness
See Performance.
Risk The loss expectancy as a function of a set of incidents’ vulnerability and impact,
measured in monetary units per year. The maximum risk is the certainty of losing
the total value of the organization within a year or less.
Role A set of responsibilities.
(Equivalent to [ISO/IEC 15408:2009] role.)
Scalability The ability of an IT service, process, configuration item, etc. to perform its agreed
function when the workload or scope changes (up or down).
Secret Information shared in a controlled way between a group of people.
Security The result of continuously meeting or exceeding of a set of objectives.
(Not equivalent to [ISO] security.)
Security Architecture
The re-usable and scalable implementation of security pattern solutions.
Security Objective
A business expectation or requirement that is dependent on a security process.
(Not equivalent to [ISO] security target.)
Security Pattern
A solution for a complex and commonly encountered security problem.
Security Target
A frequency and financial threshold for a metric derived from a security objective.
(Not equivalent to [ISO] security target.)
Service Any code or program that provides value for users, via messages exchanged with
other services and access to repositories.
(Similar to [ITIL] service.)
Service Level Agreement (SLA)
Quality agreement between a process provider and a customer specified using a set
of metrics.
(Similar to [ITIL] SLA.)
Service Level Objective (SLO)
See Threshold.
Session A temporary relationship of trust between services or interfaces. The establishment
of this relationship can start authentication one way or both ways and can time out
or be terminated by either service or interface.
![Page 118: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/118.jpg)
102 Open Group Standard (2011)
Skills Demonstrated personal attributes and demonstrated ability to apply knowledge and
competence.
Signing Process that records the will and intent about a repository of the owner of the user
account or certificate concerning a repository, such as agreeing, witnessing, or
claiming authorship of repositories and messages like original works, votes,
contracts, and agreements.
Special Cause
An assignable cause for a metric going beyond current thresholds.
Specific Goal
An objective of a set of specific practices.
Specific Practice
A process.
Stakeholder A person, team, or organization with interest in the success of a process, a
management system, or an organization.
Strategic Processes (SP)
Processes that determine the objectives of lower-level processes.
Supplier See Provider.
Tactical Processes (TP)
Processes that provide a framework for operational delivery. These processes
normally involve resources management (people, time, money, information,
infrastructure, etc.).
Target The information asset (applications, systems, nodes, services, interfaces,
repositories, or channels) which may be the victim or potential victim of an attack.
Terminal An interface that is used directly by a user.
Threat Any potential cause of an attack, accident, or error.
Threshold Value against which a measurement is benchmarked or evaluated. In the context of
Service Level Agreements it is called a Service Level Objective (SLO).
(Equivalent to [ITIL] threshold.)
TPSRSR Acronym for Transparency, Partitioning, Supervision, Rotation, and Separation of
Responsibilities.
Transaction A discrete function performed by an IT service. For example, transferring money
from one bank account to another. A single transaction may involve numerous
additions, deletions, and modifications of data. Either all of these complete
successfully or none of them is carried out.
Trend The general shift, tendency, or propensity of a set of statistical data as related to
time.
![Page 119: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/119.jpg)
Open Information Security Management Maturity Model (O-ISM3) 103
Underpinning Contract (UC)
A Service Level Agreement (SLA) between an external process or product provider
with a customer.
User The person who uses an information system.
User Account
Representation of a user in an information system. A user account can be linked to a
person or group of persons.
User Registration
Process that links user accounts and certificates to identifiable users, and manages
the lifecycle of user accounts, certificates, and access rights.
Visibility The degree to which information assets at a border present interfaces or provide
services to information systems outside the organization.
Vulnerability
The likelihood of an incident, measured as real instances against possible attacks,
accidents, and errors per year. These attacks, accidents, and errors can be triggered
by one or several threats.
(Not equivalent to [ISO] vulnerability. Similar to [COBIT] risk.)
Warning See Alert.
Weakness Any fault in services, messages, channels, repositories, interfaces, organizational
processes, or responsibilities assignment that provides an opportunity for an error,
attack, or accident.
(Equivalent to [ISO] vulnerability.)
Workplace Security
A cross-disciplinary area concerned with protecting the safety, health, and welfare
of people engaged in work or employment, the goal being to foster a safe work
environment.
![Page 120: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/120.jpg)
104 Open Group Standard (2011)
Index
borders .............................................. 87
bottom-up implementation ......... 77, 81
business context ............................... 22
business objectives ........................... 24
capabilities ......................................... 5
capability ............................................ 5
capability levels .................................. 6
certification ........................................ 3
channels ............................................ 87
components ...................................... 87
dependency analysis ......................... 25
diagnosis ........................................... 20
document codes ................................ 87
evaluation ......................................... 18
failure ............................................... 32
generic processes .................... 8, 34, 36
guidelines ......................................... 74
implementation ................................. 18
implementing ISM3 ................... 39, 77
incident ............................................. 31
interfaces .......................................... 87
interpretation .................................... 19
investigation ..................................... 20
ISC2-CISSP ....................................... 4
ISM3................................................... 2
ISM3 concepts .................................... 5
ISM3 process model ......................... 34
ISMS .................................................. 1
ISO 9000 ............................................ 2
ISO/IEC 27000:2009 ........................ 92
IT managed domain.......................... 89
knowledge management ................... 18
levels .................................................. 8
management practices .................. 5, 34
maturity .............................................. 5
maturity levels .............................. 6, 82
RoI .................................................... 7
measurement .................................... 19
messages ........................................... 88
metrics ................................................ 5
operation ........................................... 18
operational ........................................ 34
operational management .................. 51
operational processes ....................... 10
outsourcing....................................... 73
partitioning ....................................... 13
process ............................................... 5
roles and responsibilities ................ 12
process definition ............................. 11
process metrics
operational use ............................... 19
process metrics definition ................ 16
process metrics specification ........... 17
process types
operational ........................................ 8
strategic ............................................ 8
tactical .............................................. 8
processes .................................... 78, 87
repositories ....................................... 87
representation ................................... 20
risk management ................................ 1
rotation ............................................. 13
security controls ................................. 1
security management ................... 1, 34
security objectives ............................ 25
Security Policy ................................... 1
security targets ................................. 26
security-in-context model ................ 23
separation ......................................... 13
service-level agreements .................. 73
service-level objectives .................... 73
services............................................. 88
sessions ............................................ 88
specific processes ............................. 34
strategic ............................................ 34
strategic processes .............................. 9
structural features ............................. 87
success ............................................. 32
supervision ....................................... 13
tactical .............................................. 34
tactical management ........................ 44
tactical processes ................................ 9
top-down implementation .......... 77, 79
transactional features ....................... 88
transparency ..................................... 13
![Page 121: Open Group Standard](https://reader031.fdocuments.in/reader031/viewer/2022012011/613d646e736caf36b75cca08/html5/thumbnails/121.jpg)
Open Information Security Management Maturity Model (O-ISM3) 105