Page 54 - CISSO_Prep_ Guide
P. 54

The challenge comes when the system owner is not aware of the
            security requirements they are accountable for. An owner may
            wish to implement as little security as possible since it may
            affect productivity. However, the system owner must realize that
            it is their responsibility to accept the risk of any resulting
            security breaches. For this reason, we see some movement in
            governments and organizations to declare a separate role of
            authorizing officials. The authorizing official has an enterprise-
            wide responsibility and operates at arm's length from the system
            owner. The authorizing official must approve all system changes
            or implementations before implementation. This ensures that no
            owner can put a system into production, operate an order, or
            make changes to a system that may pose a risk to other systems,
            the organization, or its operations. This is addressed through a
            process known as systems authorization or formerly known as
            certification and accreditation.



            Information Owner
            The information owner is the person designated to be
            responsible for the protection of the information held by the
            organization. Organizations are responsible for adequately
            protect any sensitive information they process, store, or transmit.
            The requirement to safeguard information applies to personally
            identifiable information (PII) intellectual property or trade
            secrets.

            One of the first responsibilities of the information owner is to
            identify and classify all information being held by the
            organization. The process of information classification will be
            examined in more detail later in this book.
   49   50   51   52   53   54   55   56   57   58   59