Page 107 - CISSO_Prep_ Guide
P. 107

requirements and systems integration. Other models that use this
            same  approach  are  Zachman  (www.zachman.com),  TOGAF
            (www.opengroup.org ), and ITIL (www.itil.org).

            The  implementation  of  the  information  security  strategy  is
            founded  on  the  use  of  people,  processes,  and  technology  all
            working  together.  It  can  be  said  that  an  information  security
            program  is  having  the  "right"  people  (personnel  with  the
            necessary  skills  and  training)  using  the  "right"  products
            (products/technology that is being used correctly) in the "right"
            way (with correct procedures and operational controls).

            A misconfigured firewall, or a lack of change control procedures,
            or an untrained administrator can all lead to a serious security
            breach. Security is a fabric of several threads that must be woven
            together - every thread is important, and any break in the thread
            can affect the integrity and strength of the entire fabric.
            A security system is based on a foundation of policy. The policy
            directs the implementation of security and is the authority behind
            procedures,  standards,  and  baselines.  Procedures  are  the
            implementation  of  policy  into  practical  steps  that  result  in
            consistent  operations.  Following  a  procedure,  ensures  that  all
            users will be set up correctly in a manner that would identify any
            inconsistencies and alert management to potential risk. The use
            of standards allows the organization to leverage the benefits of
            using a standard product, which can result in savings in training,
            spare parts, acquisition, and incident handling.
            The  use  of  baselines  ensures  that  systems  are  configured
            consistently. This ensures that all systems meet, at a minimum at
            least, a defined level of security. These are all valuable tools to
            take the intent and objectives of policy and develop them into a
            practical and auditable security framework.
   102   103   104   105   106   107   108   109   110   111   112