7 hours 52 minutes
organizational roles and responsibilities
during this lesson will be covering specifically closed 5.3 organizational roles, responsibilities and authorities,
and we'll look at who the responsibility sits with for setting roles and responsibilities.
We'll take a look at some examples of roles within an icy mess as well as how to document these roles.
who needs to define and assign roles and responsibilities?
Yes, top management.
This is another way in which top management demonstrates their commitment to implementing and maintaining an icy mess, as well as getting it certified against the I. So 27,001 standard.
Without formally understanding the roles that are required to perform the ice mess
and ensuring that these roles are appropriately fold
and communicating not only the importance of these roles but the authority that these roles hold within the organization.
The ice miss will not likely succeed.
Top management needs to back these roles and stress their importance to the rest of the organization,
especially in the cases where these are new rules.
Implementing new controls and increased security measures is challenging
even more so where no one in the company knows what your role is or why it is important.
So top management is responsible for ensuring that the responsibilities and roles relating to the ISMs are formally assigned and communicated.
Formal roles with associated authorities should be mandated to carry out required functions.
It doesn't help creating roles that don't have appropriate authorities to make decisions and carry out functions within your organization.
They must be recognized authority associate ID to rules
activity should be formally assigned to individuals to ensure that they are performed.
Generally, actions are just left hanging unless someone is specifically made responsible
and accountable for ensuring that these activities are completed as and when they need to be.
So what roles or responsibilities are required?
There are specific roles and responsibilities that are defined in the 27,001 standard, which are required to be filled.
These are not the only roles that could be required by your SMS,
depending on the size and nature of your organization.
Specifically, in terms of its risk profile,
you may need a large information security team that manages everything from governance, risk management, compliance, network hardening, incident monitoring and response, and so forth.
In small organizations. These functions may be required on a much smaller scale, making it possible for across skilled team to manage the roles and responsibilities.
Ultimately, you need to ensure that the required information security functions are being performed
and that the appropriate monitoring of these functions is taking place.
In many instances,
existing stuff that I'm not directly responsible
for an information security function may be required to assist in monitoring and reporting on information security performance within their department.
For example, your H R team may be responsible to participate in your eye smears
by providing you with specific metrics pertaining to the HR department.
Another example of that
when new hires join,
does HR ensure
that the correct paperwork pertaining Thio user access rights
is kept on their users file so that when the user leaves organization, the appropriate access rights are terminated.
I'm not saying it's a child's responsibility to perform determination,
but it is a child's responsibility to help ensure that users are appropriately off boarded.
It is clear, and now, based on the example why top management involvement in the communication of these roles and responsibilities is quite important,
many departments would really feel overwhelmed
and overloaded with their own work and adding additional items to worry about, for which they may not see the value can be a challenge to overcome.
Let's have a look at the two requirements that the ISO 27,001 standard defines
The first one
is to ensure that the Information security management system conforms to the requirements of this international standard.
So that's a very broad statement.
In essence, this is saying there must be a dedicated resource that ensures that the ice mess maintains a compliance state.
In other words, all the clauses set forth in the standard are incorporated appropriately into the ice, Miss
and I'll be being performed as and when they should be.
The second requirement is reporting on the performance of the Information security management system to top management.
So this simply states that top management, your sponsors for the ice mess and for getting it certified
need to be kept in the loop regarding the performance of the ice Miss,
we will get into the matrix and monitoring later on. But this is an important element in your eyes mess and the appropriate support and authority for this reporting activity must be present.
Let's take a look at some examples of roles and activities.
Generally, you would have an icy mess coordinator or champion.
They would be the spearhead off your Christmas implementation and maintenance project.
They would not necessarily do all of the activities alone and shouldn't,
but they would have the in depth knowledge about the I. So 27,001 standard. How to implement this on how Thio involve the rest of the organization In making this a successful activity
and activity you would need to perform is an information security risk assessment and treatment advisory
because of the nature off a nice mess and how focused it is on information security risk management.
Ideally, you would want someone dedicated thio
understanding information security risk management principles
to a very deep level so that they can guide and advise participants in your risk assessment and management workshops
to ensure that the correct level of information is obtained during these workshops,
information security processes and system design.
This is an important activity. While it might not be a standalone role, there should be assigned to someone with the appropriate level of skill
sitting standards for the configuration and operation for information security controls
again, this is an activity to be performed and not necessarily a standalone role, although it could be.
The important thing is to ensure that there is someone dedicated to this activity
and there are formerly assigned as the responsible party.
You would need to have an information security incident manager
and your team
to ensure that information security incident activities
are appropriately conducted and coordinated.
are important in a nice mess as they are the decision makers regarding controls and different requirements around your information
These roles own processes within the organization and would be responsible for processes occurring,
as well as reporting on the effectiveness of the processes.
Asset owners are similar Thio information owners as information is an asset.
However, there would also be acid owners for your supporting assets, such as hardware and software.
Risk owners are are an important role
as these are the people that own specific risks within the organizations.
are important to ensure departments and teams are carrying out their required supporting Iceman's functions,
and you will also have information users.
So how should responsibilities be defined
when it comes to information, security roles and responsibilities. There is often more than one party involved in one way or another.
Now, While the Standard doesn't explicitly say that this information needs to be documented, it does say it must be assigned and communicated.
Now it is often a lot easier to define and communicate something that is documented.
So let's have a look at a couple of ways in which the information can be documented
and each organization will need to choose what works best for them.
A racy chart is a really nice way to depict in a one page of you who the involved parties are, what the functionalities and responsibilities are
onto, what level each party is involved in each function.
Yeah, we've included a really basic example of a racy chart,
but these will obviously get really complicated the more roles and responsibilities your organization has.
You can also organize roles and responsibilities in organizational charts
and obviously have write ups off roles and responsibilities in people's job descriptions.
In this lesson, we covered white Top management should define the roles and responsibilities.
We examine some examples of roles and activities performed to support a nice Amis
and recovered ways in which roles and responsibilities can be documented, either using a racy chart organizational chart
and having job descriptions to support these.
Kali Linux Fundamentals
If you’re interested in penetration testing and ethical hacking, then this Kali Linux course is ...
1 CEU/CPE Hours Available
Certificate of Completion Offered
Application of the MITRE ATT&CK Framework
This MITRE ATT&CK training is designed to teach students how to apply the matrix to ...
10 CEU/CPE Hours Available
Certificate of Completion Offered