11
                  Security Management
                    Download printable version 
                  IT Security Management is the process of managing a defined
                  level of security for information, IT services and infrastructure.
                  IT Security Management enables and ensures that: 
                   Security controls are implemented and maintained to
                        address changing circumstances such as changed business
                        and IT
  service requirements, IT architecture elements, threats, etc 
                     
                    - 
                      
 Security Incidents
                      are managed 
                     
                    - 
                      
 Audit results show the adequacy of security
                      controls and measures taken 
                     
                    - 
                      
 Reports are produced to show
                        the status of information security. 
                     
                   
                   
                    IT Security Management needs to be part of every IT manager’s
                    job description. Management is responsible for taking appropriate
                    steps to reduce the chances of a security Incident occurring
                    to acceptable levels. This is the process of risk assessment
                    and management.  
                  Corporate executive management is accountable to stakeholders
                    and shareholders for security, and is responsible for defining
                    the corporate security policy. IT Security Management is
                    governed by that policy. The existence of the policy registers
                    and reinforces the corporate decision to invest in the security
                    of information and information processing. It provides management
                    with guidelines and direction regarding the relative importance
                    of various aspects of the organisation, and of what is allowable
                    and what is not, in the use of ICT systems and data. 
                  Figure 11 illustrates the information security process as
                    seen by the business. It covers all stages, from policy setting
                    and initial risk assessment, through planning, implementation
                    and operation, to evaluation and audit. 
                  
                  
                      
                    Figure 11: The Information Security Model
                    (ISM) 
                     
                      Every organisation must have an information security policy
                      that is widely circulated, committed to by everyone within
                    the organisation and actively enforced and reviewed. 
                    Figure 12 provides an overview of the ITIL IT Security
                      Management Process. The process shows the complete route
                      from the collection of a Customer’s requirements,
                      through planning, implementation, evaluation and maintenance – under
                      a framework of control - with regular status reporting
                      to the Customer closing the loop. 
                    
                      
                      
                    Figure 12: The IT Security Management Process 
                     
                      Intrinsic elements of all activities within the IT Security
                          Management process are risk and vulnerability assessment,
                          and management and the implementation of cost justifiable
                          countermeasures to reduce vulnerability and risk to
                          an acceptable business level. These activities must
                          be closely
                          co-odinated with all other areas of Service Management,
                          especially the Availability and IT Service Continuity
                      Management processes. 
                      Table
                    of contents | Previous | Next 
                   
                 |