ISO/IEC 27014: Governance of Information Security:
1. Establish organization-wide information security.
2. Adopt a risk-based approach.
3. Guide investment decisions.
4. Ensure compliance with internal and external requirements.
5. Promote a security-positive environment.
6. Evaluate performance in relation to business outcomes.
SecSDLC
Security Systems Development Life Cycle
CISO
Creating strategic InfoSec plans
Suggests security solutions
Develops action plans, budgets, and reports for top management
Maintenance
Requires constant monitoring, testing, and updating of InfoSec systems
Implementation
Combining SDLC with project management
SDLC
Systems Development Life Cycle
Translation Process:
General strategy is transformed into specific strategies/ plans.
Strategic planning is further translated into lower-level tactical and operational plans.
Operational planning—Clearly identified coordination activitiesacross department boundaries, communications requirements,weekly meetings, summaries, progress reports, and associated tasks.
SDLC: a tried-and-true approach that combines sound projectmanagement practices to develop key project milestones, allocateresources, select personnel, and perform the tasks needed toaccomplish a development project’s objectives. SDLC involves thegeneral methodology for design and implementation of aninformation system in an organization
SecSDLC: aligned with risk management practices. Involvesidentifying specific threats and risks, and the subsequent design andimplementation of specific controls to counter those threats andassist in management of the risk. SDLC involves the generalmethodology for design and implementation of an informationsystem in an organization.
major objectives of SecSDLC
investigation
analysis
Logical Design
physical design
implimentation
maintenance
Magerial control address the design and implimentation of the security planning process and the security program management
operational security control deals with operation functionalityof security in the organisation. They cover management functions and lower level planning such as disaster recovery and incidenceresponse planning (IRP).
technical control addresses technical approaches used to implement security in the organisation