Skip to main content
Erschienen in:
Buchtitelbild

Open Access 2020 | OriginalPaper | Buchkapitel

3. Put the Right Security Governance Model in Place

verfasst von : Dan Blum

Erschienen in: Rational Cybersecurity for Business

Verlag: Apress

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The security-related roles discussed in Chapter 2 must be enacted in security governance and established in security policy. Security governance is a set of processes and capabilities operated jointly by security and business leaders to establish and oversee appropriate operation of the security program. Through security governance, the combined leadership can manage cybersecurity risk, security policy, resource allocation, and reporting to executives and stakeholders.
Just as a Constitution sets forth how to govern a nation, security charters and policies can formally define security-related roles and responsibilities for a business. Security governance is a set of processes and capabilities operated jointly by security and business leaders. The combined leadership manages cybersecurity risk, policy, budgets, and reporting to executives or stakeholders.
When security governance is well defined, the CISO has the right balance of authority and responsibility. Business and security leaders can handle security issues in a collaborative manner. Executive security steering committees, or forums, enable security and business leaders to align responsibilities and projects or resolve issues.
This chapter contains recommendations on how security leaders can
  • Address common challenges
  • Understand security governance functions
  • Understand and apply the optimal security governance model
  • Reset (or define) security governance
  • Institute cross-functional coordination mechanisms
  • Manage security policy libraries, lifecycles, and adoption
  • Budget in alignment with risk and the governance model

3.1 Address Common Challenges

Failures of business and IT teams to engage in the security-related activities relevant to their security-related roles are often failures of security governance. Perhaps the security function in the organization isn’t structured right, or the security policy doesn’t reflect the business priorities. Symptoms of security governance model challenges, or lack of maturity, include disengaged business units and perverse incentives for the security program.

3.1.1 Security Governance Model Not Aligned with Organizational Structure or Culture

I’ve seen three basic types of security governance models: centralized, decentralized, and matrixed. Which one is optimal? Generally, the model should align with the way that the business itself is governed and/or the way it provides IT services. For example, if the business has subsidiaries each operating their own IT fiefdoms, security cannot be fully centralized.
Many medium and large, complex organizations are tending to become more decentralized in the age of the digital business. To fulfill enterprise security requirements, they tend to need some form of matrixed security governance. For example, a CISO might provide overall security leadership, while operations are farmed out to IT groups in various business units. The CISO position itself could report to IT, or it could report to another executive business function such as the CEO or the Chief Risk Officer (CRO). There are advantages and disadvantages either way, and the right answer must be aligned with the business and IT culture and any operational or regulatory requirements.
Friction with business units can result from having the wrong security governance model, and security-related activities become more difficult to accomplish.

3.1.2 Lack of Security Governance Maturity

As we’ll see in the section “Understand and Apply the Optimal Security Governance Model,” a matrixed model is often the best solution for a complex organization, such as a multinational company. However, operating matrixed security governance requires more sophisticated (or mature) security management committee structures, cross-functional alignment, and security policies. Without the maturity, matrixed governance may fail to govern.

3.1.3 Security Leadership Disengaged from Business Units

In Chapter 7, we identify digital business and cloud-first strategies as trends that tend to weaken business unit engagement with traditionally minded IT departments. The security organization may be tightly embedded under an IT department riven by technical debt and hollowed out by shadow IT. Business units are rapidly adopting cloud solutions, and the overall IT environment is becoming more decentralized. Cybersecurity still is, and should be, a management concern, but the security department may have no room to maneuver because of any (or all) of these reasons:
  • The security leadership lacks credibility, or it is discouraged from engaging LOBs to support their initiatives.
  • No matrix governance structure exists to engage LOBs.
  • The security organization is swamped with the work of protecting the shared IT environment and legacy core applications. It has no bandwidth or mandate to support LOBs.
As described in Chapter 7’s section “Discern the IT Strategy and Align the Security Road Map to IT,” security leaders can take advantage of the inherently cross-functional nature of security to work with IT to develop IT and security strategy, align security priorities with strategic platforms, and engage with LOB initiatives.
However, the security governance function may need a reset (see the section “Reset (or Define) Security Governance” in this chapter).

3.1.4 Perverse Incentives

Even when business leaders are aware of cybersecurity issues, they are often subject to perverse security incentives. It's possible for business executives to place such strong demands on staff for secure outcomes that they create a perverse incentive for insecure behavior. A former financial services company CISO we interviewed (who prefers to remain anonymous) recalled that “The business and security staff at my employer from the Chief Counsel on down were more afraid of the CEO and the Board reaction to regulatory reports than they were of breaking the law.”
“Ironically,” our ex-CISO colleague continued, “I don’t think the executives were even conscious that they were pushing staff towards making false reports. As far as they were concerned, they’d put security first. They’d granted the full budget we asked for.”
This is a tough challenge! More alignment in top-level thinking will probably be needed to pull off a successful security governance reset. Security leaders who choose to stick around and face the challenge can take a leaf out of the “crucial conversations”1 book I keep out on my office reading stack; it provides useful scripts to prepare for difficult discussions. It could also be helpful to engage an executive change management consultant or another senior mediator.

3.2 Understand Security Governance Functions

What does security governance govern or do? Its main functions are to
  • Charter or mandate the security program: Define “security” or “cybersecurity” for an organization in terms of its mission, governance, reporting structure, and operating principles. Formally specify which organizations or roles within the business have authority over security strategy, policy, projects, budgets, committees, and operations.
  • Manage, control, and report on risk: Identify, track, manage, and report information risks to the executive level along with other enterprise risks. Ensure the security strategy and project portfolio are aligned with business risks and risk appetites.
  • Coordinate security projects and manage issues: Set up, sponsor, and chair forums engaging multiple stakeholders including the CISO, CIO, CRO, head of audit, and LOB executives critical to the success of projects and processes. Mediate issues escalated to the business cybersecurity governance level.
  • Manage security policy: Work with the business, IT, and other areas to develop security policies, standards, processes, and procedures; gain agreement and formal adoption; and manage the policy lifecycle.
  • Allocate security budgets and resources: Decide how to pay for security program capital and operating expenses (CAPEX and OPEX). Allocate funds and resources to the security organization and other groups responsible for delivering security projects or services. Approve proposed budgets and major expenditures.

3.3 Understand and Apply the Optimal Security Governance Model

The security organization is just one organization in the business. It must work with executives, IT, development, corporate administration, and LOBs. As discussed in Chapter 2, many security-related roles must be carried out by business leaders and staff outside the core security organization.
The security governance model, or structure, defines the way the security organization and the security program relate to the rest of the business. There are fundamentally three security governance models:
  • Centralized
  • Decentralized
  • Matrixed
Any of the three models can work if applied in the right way in the right place. However, in some cases security governance structures result more from happenstance and personalities than from well-thought-out organizational thinking and thus may not be properly aligned with the business culture. Figure 3-1 shows the three models and the way that each of them can thrive.
https://static-content.springer.com/image/chp%3A10.1007%2F978-1-4842-5952-8_3/MediaObjects/495216_1_En_3_Figa_HTML.jpg
3-1
The security governance model should generally follow the IT organizational structure unless management supports the notion that security should act as a matrix function over decentralized IT units. Both security and IT governance models should align closely to the business culture or management intentions for the culture.

3.3.1 Centralized Models

In a centralized security governance model, one person or department makes all the important decisions, controls operations, resolves disputes, and sets the strategy and the budget for security. Responsibilities can be delegated but managers still report directly to a single leader who serves as a central authority. Centralized governance with strict hierarchy is typical of military and often civilian government and some corporate organizations.
Centralized Network Security Governance Story
I was subcontracted recently to perform a network segmentation architecture for a large financial services company in the United States. In the first draft of our current state analysis, my engagement partners and I noted the company needed better processes for making security zoning more risk based. However, the client told us risk management was out of scope; network security should be based on prescriptive rules only. We learned that the CISO of this company has a legal background and runs security “very much behind the door.” That is, risks and high-level decisions about them aren’t generally discussed in a transparent fashion even within the security organization itself.
This kind of centralized security governance model is suitable for some security cultures and industries. But outside of those, it may face challenges as digital businesses become flatter, more decentralized.

3.3.2 Decentralized Models

In the decentralized model, multiple organizational units operate security programs independently. This is common among multinational organizations or businesses that have grown by acquisition. Each organizational unit in this model has its own security team.
The decentralized model doesn’t preclude the business from requiring units to coordinate on developing shared services or from following some common standards. But if a decentralized organization has a CISO at the enterprise level, this CISO will tend to be in a weak position. Don’t be fooled by the “Group CISO” title you sometimes see in this case. In the decentralized model, each line of business (LOB) manages IT and security according to its own needs.
Story of Consensus-Based Standards in a Decentralized IT Organization
In the early 2000s, I worked with a team of consultants to help a large pharmaceutical company develop a network architecture and, later, an identity and access management (IAM) architecture. These turned out to be large projects with high visibility because the company governed IT through a biweekly half-day CIO council meeting. The executives would come together as equals and decide on standards to make their autonomous systems work together. We spent a few months on each project facilitating consensus with extended teams of architects from the different units. Ultimately, the CIO council approved the architectures.

3.3.3 Trade-offs

If we were to imagine a continuum between highly centralized and decentralized security governance models, we wouldn’t have to go too far toward either extreme before seeing issues and disadvantages.
Too centralized means rules for security governance may be too rigid. Some LOBs need more flexibility and, in the end, may not cooperate with security strictures. Too decentralized and LOBs will likely duplicate security efforts (or make inadequate efforts) creating inconsistent security controls that make it hard for the business to respond coherently to common threats or compliance requirements.
Story of Decentralized Firewalls Putting a University at Risk
In early 2015, I worked on a security assessment for a large US-based university that did not have a centralized firewall infrastructure. Each of more than 50 colleges and other units had its own firewall; without a core network security competency, many of the firewalls were found to have an insecure configuration, and some were beyond product end of life.
Given the trade-offs between centralized and decentralized models, organizations often turn to the matrix model in search of a sweet spot.

3.3.4 Matrix Models

Matrix security governance structures can coordinate the management of cybersecurity for very large organizations. Figure 3-3 illustrates an example that operates governance at four levels.
  • Lines of business and IT services
  • Cross-functional working groups
  • Executive committees
  • Board (and executive-level) meetings
Let’s decompose how the matrix works at each level.
Lines of business and IT services: At the lowest level, LOBs or regions in Figure 3-3 run their own IT functions; however, some commoditized services such as email systems and endpoint anti-malware may be shared. LOBs and regions may also use cloud computing services from diverse vendors.
More strategically in the matrix model, local business units can plan for future iterations of the applications and shared services they need. They may share in the costs for shared services. There may be representatives from the CISO function on liaison to the business units, or business unit staff may have a dotted line responsibility to the Group CISO.
Cross-functional working groups: Moving up a level, matrixed organizations typically have an enterprise CISO and CIO function, for example, a “Group CISO.” However, larger business units beneath them may also have CISOs. Note that the diagram is drawn to put the Group CISO and CIO together for graphical convenience and is not meant to suggest this reporting structure is universal. Exact titles vary between companies, as do reporting structures.
The Group CISO/CIO organizations provision and protect the shared services. They continually interact with the local functions to enable, approve, or coach the lower echelon security management. The Group CIO manages the architecture and operations for shared services, and either the CIO or CISO manages security services or security components of shared IT services.
Executive committees: The Group CIO and CISO also interact on a peer-to-peer basis with the heads of business administration, that is, HR, legal, and finance, to address share budgeting and procurement processes. Cross-functional working groups may exist permanently or form temporarily to undertake major risk assessments, approve changes, or develop new architectures. The executive committees report up to the Board and executive levels. For complex organizations - such as multinational corporations with subsidiary legal entities - multiple layers of reporting may be required.
As with the centralized governance model a security team or department reports to the CISO. But in the matrixed model, some members of the team may work for other functions but have “dotted line” reporting to the CISO.
In general, matrix structures require well-articulated cross-functional and cross-divisional roles and working groups, processes, accountabilities, and lines of communication and control. Key questions: Is the matrix structure well designed or not? Does it suit the organization’s culture?
Operating a matrix organization is challenging precisely because of the cross-functional dimensions. Research suggests that most cross-functional teams are dysfunctional.2 Why then do so many organizations adopt the matrix model and then struggle with it? The answer: Once an organization gets to a certain size, or a certain level of complexity, there may not be an alternative. Perhaps, for large or complex organizations, one might repurpose an old joke about democracy: “Cross-functional governance is the worst form of governance there is except for all the others.”
Another interesting point: Many matrix governance structures are not pure; they don’t look like those in Figure 3-3. Organizations often have hybrid or composite governance models. An organization with composite governance could be decentralized as a whole but contain one or more large lines of business that operate in a centralized or matrixed manner. Each LOB might be large enough to form an enterprise. Corporate conglomerates and large national or state governments often have composite governance.

3.4 Reset (or Define) Security Governance

If business units aren’t fulfilling security-related activities, or if the security leadership itself isn’t aligned across an organization, a security governance “reset” may be required.
A well-defined security program should have a charter documented as security policy and approved by the CEO, a security policy library, and a security governance function scaled to the business’s size and circumstances. The governance structure should operate at maturity Level 3 or higher. Security leaders at businesses without these process artifacts, operating below Level 3, or experiencing some of the common challenges can directly use this chapter’s recommendations to reset the program. Security leaders at businesses with more mature security governance can check their status against the governance practices described herein and use this guidance to fill any gaps.

3.4.1 Choose the Appropriate Security Governance Model

Occasionally businesses just decide “we’re going to have centralized, decentralized, or matrixed IT or security” and then have a big reorganization. More often, one of those structures simply results from how lines of authority and decision rights are allocated over time. Nevertheless, understanding which governance structure a business has vs. which structure it should – perhaps – have is a useful thought exercise.
Security leaders rarely if ever get to choose the governance model themselves, but they should always be ready to discuss the matter intelligently. Which is the right security governance model: centralized, decentralized, or matrixed?
Most small organizations can use a centralized model and most large ones should make some attempt at formal or informal matrixed governance. But it would be a cop out to stop at that, because there’s much room for variance with different businesses. The decision tree in Figure 3-6 provides a more nuanced answer than “small equals centralized, larger equals matrixed” by using criteria based on the structure and maturity of the business.
Per the decision tree, a small organization or a large one with a hierarchical and relatively homogeneous structure (and culture) might go the centralized route for greater control and efficiency. A larger, more complex business tends toward decentralization; however, if management seeks to drive greater consistency and control, it can push toward the matrixed model as IT and security programs gain maturity. Any decentralized security arrangements should be buttressed with clear accountability for all security leadership and operations functions.

3.4.2 Charter the Security Organization

The business should specify the security program mission and define the program’s lines of authority and decision rights in a security charter document. The security charter document contains the business’s definition of security and of the security program. It must also identify how the security organization coordinates with the business and how it relates to audit, compliance, risk management, and other functions.
The charter should be a short, plain language document intended for broad consumption. It should be signed by the organization’s CEO or equivalent position to give it the gravitas to serve as the business mandate and the foundation component of the security program. It should define security for the business by describing the security program’s mission, operating principles, governance, and reporting structure. For example, the security program’s mission statement could describe security objectives including confidentiality, integrity, availability, safety, and privacy in terms of the business’s specific high-level goals and requirements. The charter should also reference core governance principles; the following is a short sample
  • The Board of Directors (BOD) and CEO (or BODs/CEOs in a legal entity with subsidiaries) are accountable to the public for risk.
  • Business leaders are ultimately accountable to the CEO(s) for risk in their LOB or administrative function. Executive leadership sets the risk appetite and thresholds for the organization.
  • Business leaders delegate security operations and incident response to security leaders and rely on security leaders to advise them on cybersecurity risk.
  • Compliance to all applicable regulations must be the logical consequence of an effective risk management framework and program of internal controls.
  • Operations, assurance, and audit functions are organized to provide three lines of defense (see Chapter 6, section “Use Two or Three Lines of Defense Model for Control Assurance”).
Security is everybody’s business according to their role. While avoiding specific job titles, the charter and subordinate policy documents should spell out the accountabilities and responsibilities for cybersecurity for general business roles such as
  • Executives and business risk owners
  • Risk, compliance, and audit functions
  • Security program executive sponsor
  • Security management and staff
  • Asset or data owners and data stewards
  • All staff
The charter should call for establishing a cross-functional coordinating committee (aka security steering committee) as a security governance forum for business, IT, and security leaders to authorize and oversee major security projects, budgets, and changes. The charter should also define the security policy hierarchy. Few or no details are required in the charter itself other than basic scoping of the committee's basic makeup and purpose.
The charter explicitly defines the security governance model. It can specify whether the organization shall have a security leader with the CISO title. It can also specify where the CISO or security leader reports and the scope of responsibilities. The following guidance is intended especially for businesses that have formally appointed a CISO in a corporate officer position.

3.4.3 Specify CISO Reporting

Per Chapter 2’s section on the “Head of Security or CISO,” the “CISO” title sets an expectation that the security leader can represent the security program to the Board of Directors, external regulators, and other stakeholders as well as sit in on top business and IT leader meetings as a peer. Where a security leader, or CISO, reports in the business hierarchy is also an indicator of whether he or she is empowered to drive a cybersecurity program for the business.
In my experience, most CISOs – at least half – report to the CIO. Strong arguments can be made that this is a good thing, for if the CISO is responsible for IT security, shouldn’t the position associate closely with IT? However, many security experts argue against putting the CISO too low in the organization chart or against creating a potential conflict of interest between security and a CIO whose performance objectives, such as application time to market, may run counter to security. Experts with this view advocate having the CISO report to a senior executive outside of IT – such as the CRO or CEO (aka CXO).
For the purposes of Rational Cybersecurity, there isn’t one right answer. Suppose the Board considers this question: “What’s more important for our Cybersecurity? Operational effectiveness and Security-to-IT alignment, or strengthening security by making it an independent function?” Directors of highly regulated organizations tend to have separation of duty requirements and prefer CXO reporting, whereas organizations under less security pressure are more likely to choose CIO reporting. Depending on the business’s cybersecurity maturity level, management style, and executive personalities, either reporting structure can work, with caveats.
CIO reporting structure caveats: In most organizations where the CISO is directly responsible for conducting or overseeing IT security operations, one of our CISO contributors observed: “As the CISO, it is critical to be no more than one level removed from the Board (or CEO) and to have my name on the security section of the Corporate Board Reports.” Without that visibility, and the opportunity to present important security initiatives and budgets to executives, the CISO position might be too weak to conform to the expectations created internally and externally by using the “CISO” title.
https://static-content.springer.com/image/chp%3A10.1007%2F978-1-4842-5952-8_3/MediaObjects/495216_1_En_3_Figb_HTML.jpg
3-2
Once businesses reach a certain size or level of security pressure, they should give their top security leader the “CISO” title. Leaders with the “CISO” title should have access and visibility to executive management and the Board.
Also, note that empowering an independent internal audit function, whether or not it is required by regulations, may provide an adequate check and balance on the CIO even though the CISO reports to IT.
CXO reporting structure caveat: If a business places the CISO function outside IT, bear in mind that IT staff may consequently be responsible for more of the security operations. A dotted line reporting arrangement could be set up between these staff and the CISO provided the maturity in governance and awareness exists to enable such matrixed functions to work well. More than one security or business leader I spoke to in more than 60 interviews while writing the book agreed that this could be the right arrangement but requires maturity.
Change is the only constant: More than one CISO I interviewed noted: Not only does the optimal reporting structure depend on hard-to-quantify management style factors, these factors change frequently.
“Organization design and placement of the CISO (or CSO) function needs to be dynamic, depending on who has which strengths and who doesn’t. The Tuckman model (forming-storming-norming-performing)3 applies as executive teams or IT teams change.”
David Cross, Senior Vice President, Chief Security Officer at Oracle SaaS Cloud
There’s clearly much more to say on the subject, and if you’re interested all three authors of the “CISO Desk Reference Guide” opine on the role and reporting considerations right in their first Chapter - “The CISO”.4

3.5 Institute Cross-Functional Coordination Mechanisms

Even for smaller businesses that don’t think of themselves as needing matrixed governance, many security projects tend to be cross-functional and face the same challenges as in larger organizations. Harvard Business Review research found: “Projects that had strong governance support – either by a higher-level cross-functional [executive team] or by a single high-level executive champion – had a 76% success rate, according to our research. Those with moderate governance support had a 19% success rate.”
Businesses should have a formal executive coordinating function responsible for cybersecurity. In addition, consider chartering an executive-level risk management committee (such as the Board Audit Committee or others) to act as the risk management forum for information risk. Finally, processes should exist for security governance to oversee IT or security projects and processes.

3.5.1 Cross-Functional Security Coordination Function or Steering Committee

A large enterprise can establish a dedicated steering committee for security-related operations, projects, and business decisions. However, mid-size organization may reasonably combine the function into a general IT leadership committee as one of its recurring work topics. We’ll refer to the coordinating function generically as a “steering committee.” The level of security pressure is another factor determining whether to have a dedicated committee: In 2017 and 2018, I consulted for a US-based systemically important financial market utility (SIFMU) with just a few hundred staff but a regulatory requirement to focus heavily on security at the highest levels of the business.
The steering committee authorizes and at a high level can direct security projects, oversee security policy, and control the security organization structure. The heavy hitters among the leadership – those holding CISO, CIO, Chief Risk/Privacy/Compliance offices, legal, HR, and third-party management positions (or roles, in a smaller business) – should be represented on the committee. So should key LOB leaders such as manufacturing, sales, distribution, and operations. The business and security executives themselves can attend or appoint leaders with signoff authority delegated on their behalf. (In larger businesses, major LOBs may have their own business information security officers (BISOs) as well as finance and legal representatives on the steering committee.)
The steering committee should meet approximately monthly. The sponsor and/or chairperson should have administrative support to maintain a formal agenda, track issues, manage any subcommittees or activities that require attention between meetings, and publish minutes and reports. Typical activities are
  • Authorize and oversee major projects necessary to create the security program or achieve important goals
  • Approve organizational changes, budgets, and resources for cross-functional security projects
  • Direct and oversee cross-functional projects that impact multiple business units or address strategic risks being tracked by the Board
  • Monitor regulatory and audit findings and the timely response to the findings
  • Mediate any conflicts arising out of projects or other security-related incidents and activities
https://static-content.springer.com/image/chp%3A10.1007%2F978-1-4842-5952-8_3/MediaObjects/495216_1_En_3_Figc_HTML.jpg
3-3
Ensure LOB and corporate administration business leaders are engaged with the steering committee by reflecting their concerns on the agenda, giving them important roles on the committee (possibly through a rotating chairperson function) and involving them in meaningful planning, decision-making, and approval activities.

3.5.2 Risk Management Forums

What I’ll refer to generically as the “risk management forum” could be chartered as a committee dedicated to information risk. The CISO or a Risk Manager on the CISO’s staff can chair this type of forum.
However, the forum may instead be part of an enterprise risk management (ERM) program. ERM covers financial, operational, market, competitive, and other risks as well as information risk which rolls up into it. An ERM forum doesn’t fall under information security governance, but the CISO (or a delegate) should be a member or participant.
Financial services businesses (depending on size and jurisdictions) tend to require ERM programs. Many other kinds of businesses – whether larger or small – have corporate social responsibility, ethics, and/or compliance committees to monitor enterprise risks at the highest level. Any of these executive committees (or a new group) could become the risk management forum. The forum:
  • Helps executive management and the Board determine accountability and responsibility for specifc risks, define risk appetites and create guidance on preferred risk treatment strategies
  • Translates executive risk guidance into policies and procedures for monitoring and controlling the top risks to the business
  • Maintains a list of top risks, often using tools such as a “risk register” or “risk map”
  • Tracks the risk exposure from each top risk, how it is being managed, and the status of projects related to it
  • Oversees risk reporting to the Board and to external stakeholders such as investors, auditors, and regulators
https://static-content.springer.com/image/chp%3A10.1007%2F978-1-4842-5952-8_3/MediaObjects/495216_1_En_3_Figd_HTML.jpg
3-4
Empower the risk management forum to support executives in taking accountability or responsibility for, and review their performance on, managing information risks.
Chapter 5 contains additional guidance on the activities of the risk management forum.

3.5.3 Interaction with IT Projects and Other Security Processes

Standing governance forums such as the security steering committee and the risk management forum are necessary and important. As the security program matures, especially in a larger enterprise with matrixed security governance, more and more issues can require regular agenda time.
Security leaders may be tempted to establish multiple standing subcommittees of the main steering committee or risk management forum but should be careful not to overdo it. Digital business demands more agility from businesses. Keeping standing security forums lean helps ensure that security doesn’t get in the way of reasonable business initiatives through overly bureaucratic processes. Rather, the business can use existing security, IT, or corporate governance processes to promote collaboration between security business leaders and oversee security projects. These can include
  • Security architecture reviews: Security architecture reviews occur as part of a project management “gate,” through which projects move on their path to completion. Disciplined Agile processes can operate more iteratively with security being addressed in the “Sprint 0” and later sprints for quality assurance.
  • DevSecOps: A fully or partially automated “pipeline” can produce test reports and documentation through which new functionality from development is promoted to production. See Chapter 7 for more details on DevSecOps and Disciplined Agile.
  • Third-party assessments: Assessments of suppliers, vendors, contractors, cloud service providers (CSPs), and so on are required as part of procurement and change management.
https://static-content.springer.com/image/chp%3A10.1007%2F978-1-4842-5952-8_3/MediaObjects/495216_1_En_3_Fige_HTML.jpg
3-5
Avoid making standing governance too heavyweight. Instead, work with IT, development, and corporate administration groups to help them understand and build enough security into their own processes.

3.6 Manage Security Policy Libraries, Lifecycles, and Adoption

When managed with tight alignment to the business, a core set of security policy documents can evolve into a collaboratively developed and formally agreed “Constitution” providing the structure for a positive security culture. Develop policies in a vacuum and they’re at risk of gathering dust on the shelf.
https://static-content.springer.com/image/chp%3A10.1007%2F978-1-4842-5952-8_3/MediaObjects/495216_1_En_3_Figf_HTML.jpg
3-6
Ensure business unit representatives provide input to security policies that will affect them. Take pains to obtain cross-functional buy-in from all affected parts of the organization.
Businesses should manage security policy documents in a hierarchical structure and develop a policy management process. The governing security policy should
  • Be owned by the security organization and the chartered steering committee but endorsed by the CEO and the Board.
  • Define a process for changes, documentation formats, review and expiration, approval procedures, and enforcement. It can be reviewed on an as-needed basis or approximately once every three years.
  • Require that all policies specify the roles of the security or business functions that own, approve, and are covered by policies. In general, avoid explicitly referencing individuals or groups that are too low in the organization and likely to be frequently moved or reorganized.
  • Establish the principle that directives or guidance should link to risk as it is understood in the enterprise and IT risk management framework in a manner flexible enough to accommodate multiple risk levels as well as changing risks and risk appetites. For example, the tiered third-party risk management process discussed in Chapter 7 could initially be established through a policy.

3.6.1 Types of Policy Documents

The term “policy” in security often conflates four or five types of control documents: a top-level security “policy” and standards, guidelines, processes, and procedure documents. Figure 3-7 displays the relationship and hierarchy among those types of documents.
Each control document or type of “policy” at a lower level of the hierarchy must operate within the permitted scope of any related higher-level documents. For example, the organization’s highest-level security policy may operate under the security charter. More detailed policy or standard documents set requirements for topics such as acceptable use, access, network security, encryption, and so on. Guideline documents and processes provide instructions. In general, the higher-level documents specify the required business security outcomes (the “what”) and subordinate documents specify the ways and means (the “how”).
Businesses should also articulate guiding principles, scope, and purpose in the top-level policies (the “why”) to help management and staff understand the policies’ intent in all situations. Although top-level policies should not contain promises of future improvements or plans, guiding principles expressed in the policies can indicate future direction in a general manner where appropriate. Table 3-1 identifies (in general) which kinds of security and business leaders own, are affected by, and must be aligned with each type of policy document.
Table 3-1
Types of Policy Documents
Document Type
Purpose
Ownership
Audience
Lifespan
High-level security policy
Formal statement of high-level control objectives (creates implicit compliance obligation)
Executive responsible for the applicable C-level function, i.e., CEO, CRO, CISO, VP compliance
Organization’s management, staff, regulators and auditors
3–5 years
Standards
Detailed, mandatory control requirements for technologies, processes, or procedures
Senior manager reporting to the executive responsible for the higher-level, governing policy
Organization’s management, some staff, regulators, and auditors
2–4 years
Processes
Describe the interactions and flows of multiple roles, multiple procedures, and multiple systems
Senior manager reporting to the executive responsible for the higher-level, governing policy
Organization’s management, some staff, regulators, and auditors
1–3 years
Procedures
Prescribe specific steps or checklists required to accomplish specific (and in many cases, technology-specific) activities
Manager reporting to the department responsible for carrying out the procedure or a departmental manager
Narrow management and staff audience. Operate in compliance with policies, standards, and processes
6 months–3 years
Guidelines
Describe discretionary activities for technologies, processes, or procedures. May be combined with standards
Manager reporting to the executive responsible for the higher-level, governing policy or standard
Intended to be helpful to management and technical audiences
1–3 years

3.7 Budget in Alignment with Risk and the Governance Model

Multiple budgets for security activities often exist across different organizational units in the business. Along with the security governance model, budgeting and resource allocation must be rationalized.
Figure 3-8 maps out where budgets for security-related activities tend to exist in the business. The security organization typically has a core budget for the activities it controls directly, but many other security budget items fall into gray areas of the IT, shared services, and even LOB’s budgets. With the expansion of cloud computing and digital business initiatives, LOBs have many options for sourcing IT. In some cases, over half of IT spend is now controlled by business units. Many LOB development projects must include activities such as application security testing.
The fact that security gets funded from multiple sources is yet another reason why it is important to be mindful of selecting, or maturing toward, the right security governance model. Table 3-2 offers some observations on budgeting in the different governance models.
Table 3-2
Budget Considerations in the Governance Models
Centralized Governance and Multiple Budgets
Decentralized Governance and Multiple Budgets
Matrixed Governance and Multiple Budgets
Regardless of who is paying for the security activities, the security team carries out security activities. This can result in good coordination. But be careful to ensure the security organization doesn’t become an unnecessary bottleneck; today’s LOBs expect agility.
There’s likely to be little or no coordination of security activities ongoing in different groups under different budgets. However, a security leader with “Group CISO” responsibility should perform an assessment to identify, and then fix, any significant risk exposure or unnecessary costs that could result.
Matrixed security governance can coordinate multiple groups and their budgets. However, it’s important to gain maturity in risk management and governance before adding governance complexity. Otherwise, time and money could be lost to cumbersome processes. Resources could go the most politically connected groups rather than the optimum risk treatments.
Through the security steering committee and risk management forum, the business can endeavor to take a holistic, risk-based approach to prioritizing funding and resources for security regardless of which budgetary pot it comes out of. Security leaders must help the business understand current risks as well as the risk mitigation options and required funding. Security deficiencies can be linked to risks, business impacts, and the accountable executives. The following are good practices for budgeting:
  • Let risk analysis inform budgeting: Some organizations build checklists of controls meant to satisfy perceived compliance requirements and fund those controls without analyzing their cost-effectiveness at reducing risk. Instead, security teams should use risk analysis to determine the top risk scenarios, control priorities, and budgets. In quantitative risk analyses, such as Factor Analysis of Information Risk (FAIR, see Chapter 5), the most serious losses due to noncompliance show up as “secondary loss events” that materialize only after a primary loss event (e.g., a breach) occurs. Avoiding the primary loss event in the first place may be the best path to reducing potential costs of noncompliance. This is just one example of how risk analysis can identify the most cost-effective controls to fund.
  • Be creative about looking for low-cost risk treatments: In some cases, the business can achieve a required security or compliance outcome through business or security process changes rather than costlier technology deployments. For example, changes in how the organization uses consumers’ personal information, or obtains consent in advance from consumers, can reduce the need for many protective or responsive controls later on in the event of cyberattacks, breaches, and data subject requests.
  • Find a way to represent technical debt in security cost accounting and use it to reduce costs in the security product portfolio: If the security organization has staff with accounting skills working on the security budget, it may be helpful to work cost of ownership into business cases in a way that represents the corrosive effects of technical debt, and promotes strategies to reduce technical debt in the IT security portfolio.
  • Review budgets quarterly or bi-annually and build in contingency plans: Be prepared to reallocate funding if a high-priority project is having difficulties, especially if other projects on the road map depend on it. Contingency plans must also prepare the security organization to deal with budget cuts that can occur due to changes in the business’s fortunes or the economic cycle.
https://static-content.springer.com/image/chp%3A10.1007%2F978-1-4842-5952-8_3/MediaObjects/495216_1_En_3_Figg_HTML.jpg
3-7
Link budget and resource requests to a business plan which demonstrates quantified risk reduction and other benefits to the business. Don’t rely on fear, uncertainty, and doubt (FUD) to drive funding approval.

3.8 Call to Action

The core recommendation for security leaders from this chapter is for them to define (or reset) cybersecurity and risk governance by
  • Creating a security charter to define security’s mission and designate lines of authority or decision rights
  • Establishing an executive security steering committee and a risk management forum (or other cross-functional coordination function scaled to the size and type of business)
  • Ensuring LOB and corporate administration leaders are engaged with the security steering committee function and empower the risk management forum function to hold business leaders accountable for information risks
  • Avoiding heavyweight security governance processes in favor of embedding just enough security-related activities into business-as-usual processes or projects that come and go
  • Developing a security policy lifecycle management function and ensuring business leaders provide meaningful input on the policies that affect them
  • Aligning and risk-informing security funding and activities that come from multiple budgets
Action – Make a quick assessment of the state of the organization’s security governance
Ask yourself the following short set of questions and score the answers in the Success Plan Worksheet’s5 Section 3, Table 3. Base your score on whether you would answer most of the questions with a strong “no” (1), a strong “yes” (5), or something in between.
1.
Does the security governance structure align well with the way IT and the business are organized?
 
2.
Is the business’s definition of security (mission, governance, reporting structure, and operating principles) captured in the security charter, and is it reflective of the way the business really works?
 
3.
Does a security steering committee meet regularly; do security, IT, corporate administration, and LOB representatives with signing authority regularly attend it; and is it effective at addressing cross-functional security issues and moving security projects forward?
 
4.
Does a risk management forum exist, and does it hold business risk owners accountable for risks and serve as a useful venue for reviewing top risk analyses and treatment recommendations?
 
5.
Are security policies, standards, processes, and procedures generally up to date, and do day-to-day practices in the business generally follow them?
 
6.
Is the security budget centralized, or are multiple security budgets rationalized in the sense that relatively little overlap exists?
 
Action – Define 1–3 improvement objectives for security governance
Note improvement objectives in Section 4, Table 5a, of the worksheet. The following are examples of security governance–related improvement objectives:
  • Create or revisit the security charter and work on getting business buy-in for a definition of security that is fully aligned with the business needs.
  • Review Chapter 2’s Table 2-2 listing security-related business roles to find any that seem appropriate for a business like yours but aren’t being fulfilled. Communicate with stakeholders and find out the reason.
  • Plan for a security policy refresh and identify business stakeholders affected by the current policy documents and potential new ones.
  • Review the minutes or records from the last 6–12 months of security steering committee (or other coordinating group) meetings, assess the committee's strengths and weaknesses, and propose improvements.
  • Work with the business finance office to collect information on all security budgets, sources of funding, and funded project charters. Call out any obvious gaps or overlaps.
Don’t limit yourself to these examples. Also consider other improvement objectives that fit the gaps and priorities you’ve identified for your business.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
Fußnoten
1
“Crucial Conversations: Tools for Talking When the Stakes are High,” Patterson & Greeny & McMillan & Switzler, McGraw Hill, 2012
 
2
“75% of Cross-Functional Teams Are Dysfunctional,” Behnam Tabrizi, Harvard Business Review, June 2015, accessed at https://hbr.org/2015/06/75-of-cross-functional-teams-are-dysfunctional
 
3
“Tuckman’s Stages of Group Development,” Bruce Tuckman, Wikipedia, 1965, accessed at https://en.wikipedia.org/wiki/Tuckman%27s_stages_of_group_development
 
4
“Tuckman’s Stages of Group Development,” Bruce Tuckman, Wikipedia, 1965, accessed at https://en.wikipedia.org/wiki/Tuckman%27s_stages_of_group_development
 
5
“CISO Desk Reference Guide,” Bill Bonney, Gary Hayslip, Matt Stamper, CISO DRG Joint Venture, 2019>
 
Metadaten
Titel
Put the Right Security Governance Model in Place
verfasst von
Dan Blum
Copyright-Jahr
2020
Verlag
Apress
DOI
https://doi.org/10.1007/978-1-4842-5952-8_3