1. About this document
It is split into five main sections, covering:
- general information about the practice
- the practice’s processes and activities and their roles in the service value chain
- the organizations and people involved in the practice
- the information and technology supporting the practice
- considerations for partners and suppliers for the practice.
ITIL® 4 qualification scheme
Selected content of this document is examinable as a part of the following syllabuses:
- ITIL Specialist High velocity IT
Please refer to the respective syllabus documents for details.
2. General information
2.1 purpose and description
Key message
The purpose of the information security management practice is to protect the information needed by the organization to conduct its business. This includes understanding and managing risks to the confidentiality, integrity, and availability of information, as well as other aspects of information security such as authentication and non-repudiation.
Information security is becoming an increasingly important but difficult task. The information security management practice is increasingly important in the context of digital transformation. This is due to the growth of digital services across industries, where information security breaches might have a major effect on an organization’s business. The wider use of cloud solutions and the wider integration with partners’ and service consumers’ digital services creates new critical dependencies, with limited ability to control how information is collected, stored, shared, and used. Partners and service consumers are in the same situation, and usually invest in data protection and information security solutions. However, a lack of integration and consistency between organizations creates new vulnerabilities, which need to be understood and addressed. The information security management practice in conjunction with other practices (including: availability management, capacity and performance management, information security management, risk management, service design, relationship management, architecture management, supplier management and other practices) ensures that an organization’s products and services meet the required level of information security for all involved parties.
The information security management practice is considered by many organizations to be a specialized branch of wider security management. In a service economy, every organization’s business is service-driven and digitally-enabled. This may lead to a closer integration of the disciplines, as security management focuses more on the security of digital services and information. This integration is both possible and useful where digital transformation has led to the removal of the borders between ‘IT management’ and ‘business management’ (see ITIL®4: High-velocity IT for more on this topic).
2.2 Terms and concepts
2.2.1 Security characteristics
The information security management practice helps to ensure the confidentiality, integrity, and availability of the information needed to conduct business, with several activities and controls needed to preserve these characteristics. Additionally, the information security management practice is often concerned with authentication and non-repudiation.
Definition: Confidentiality
The prevention of information being disclosed or made available to unauthorized entities.
Confidentiality is the first thing that many people think of when they consider information security. People and organizations want to ensure that their secrets remain secret, and that their personal or business information is not misused.
Definition: Availability[1]
A characteristic of information that ensures it is able to be used when needed.
If the information is not available when and where it is needed, then the organization is unable to conduct its business.
The availability management practice considers many aspects of service availability. However, the information security management practice is mostly concerned with the availability of information.
Definition: Integrity
An assurance that information is accurate and can only be modified by authorized personnel and activities.
Incorrect information may be worse than not having any information at all. For example, if a bank incorrectly believes that a customer has a large amount of money in their account and allows them to withdraw this, the bank might suffer from a significant loss.
Definition: Authentication
Verification that a characteristic or attribute which appears or is claimed to be true, is in fact true.
Authentication is used to establish the identity of people and things. For example:
- Usernames and passwords are often used to authenticate people, although more rigorous authentication using biometrics and security tokens is often preferred.
- Certificates and encryptions may be used by web sites to provide authentication.
Definition: Non-repudiation
Providing undeniable proof that an alleged event happened, or an alleged action was performed, and that this event or action was performed by a particular entity.
Non-repudiation has been used in business transactions since before the existence of IT systems and services. Traditionally, a signature would be used, and if a higher level of proof was needed then this signature might be notarized. Information security relies on non-repudiation so that transactions can occur. This is essential to preserve the integrity of information.
2.2.2 Assets, threats, threat actors, and vulnerabilities
Definition: Asset
An asset is anything that has value to an organization.
Assets may include hardware, software, networking, information, people, business processes, services, organizations, buildings, or anything else that is valuable to an organization. The information security management practice helps to protect assets so that the organization can conduct its business.
Definitions:
A threat is any potential event that could have a negative impact on an asset.
A threat actor is any person or organization that poses a threat.
A vulnerability is any weakness in an asset or control that could be exploited by a threat.
These terms are related in the following way: Threat actors exploit vulnerabilities to have an impact on assets.
2.2.2.1 Threat and vulnerability assessments
A threat assessment is used to identify potential threats, so that the organization can take appropriate action. This assessment may involve reviewing historical information about previous attacks on the organization, recent attacks against other similar organizations, or simply predicting potential threats that could emerge in the future. The output of a threat assessment is a list of threats that the organization needs to consider in its planning. Threat assessments can be performed on a regular basis and as a check when planning changes.
A vulnerability assessment is used to identify vulnerabilities in a specific environment, service, or configuration item. This typically involves compiling a list of potential vulnerabilities and using tools to test each component in the environment, to see if that vulnerability exists. Vulnerability assessments can be performed on a regular basis, and as a check during the deployment of infrastructure or applications. There are many tools available to support vulnerability assessments and many suppliers can perform vulnerability assessments as a service.
2.2.3 Risk management terms
The information security management practice utilizes several risk management terms and concepts. These terms are also described in the risk management practice.
The risk management terms are defined in Table 2.1.
Table 2.1 Risk management terms
Risk management term | Definition |
---|---|
Risk | A possible event that could cause harm or loss, or make it more difficult to achieve objectives. It can also be defined as an uncertainty of the outcome, and can be used in the context of measuring the probability of positive outcomes as well as negative outcomes. |
Control | The means of managing a risk, ensuring that a business objective is achieved, or that a process is followed. |
Risk treatment | Actions taken to treat a risk. Risk treatment options are: Risk avoidance: preventing the risk by not performing the risky activity Risk modification: implementing controls to reduce the likelihood or impact of the risk Risk sharing: reducing the impact by passing some of the risk to a third party Risk retention: intentionally deciding to accept the risk because it is below an acceptable threshold (and within the risk appetite of the organization). |
Residual risk | The risk that remains after the application of controls |
2.3 Scope
The purpose of the information security management practice, as described in section 2.1, is to “protect the information needed by the organization to conduct its business”. This information may be stored and processed on information systems, but equally it may be recorded on paper, or communicated in speech. This practice is concerned with the confidentiality, integrity, and availability of this information, regardless of where and how it is stored and processed. Although the focus is on information, this practice is concerned with all four dimensions of service management.
Each organization must define the scope of its information security management practice, which will typically include:
- IT systems and services
- IT infrastructure and platforms
- software and applications
- network infrastructure, including: IT networks, voice, wireless, and so on.
- client devices, such as phones, laptops, and tablets, including: all hardware, firmware, software, and applications
- IoT devices, which typically have network connectivity and processing capabilities and might also have sensors and actuators which interact with the physical world
- physical infrastructure, such as: buildings, data centres, or manufacturing facilities
- business processes
- people, including understanding the risks they pose and how these risks are managed
- partners and suppliers who play a part in the provision, management, or support of services
- data and information, whether it is stored, processed, or communicated, and the format it is in.
Within this scope, the information security management practice should ensure that:
- assets that need to be protected are identified
- risks that could impact these assets are identified and analysed
- appropriate measures are taken to manage these risks
- monitoring and continual improvement are in place to ensure that information security risks continue to be appropriately managed.
Some important aspects of the information security management practice are described in other practice guides. These are listed in Table 2.2, along with references to the practices in which they can be found.
Table 2.2 Activities related to the information security management practice described in other practice guides
Activity | Practice |
---|---|
Strategic communication with customers, sponsors, regulators, and governance body | Relationship management Organizational change management |
Operational communication with users | Service desk |
Establishing and maintaining contracts with suppliers | Supplier management |
Designing and implementing products and services | Service design Software development and management Infrastructure and platform management Service validation and testing Deployment management Release management |
Monitoring, to detect potential security incidents | Monitoring and event management |
2.4 Practice success factors
Practice success factor
A complex functional component of a practice that is required for the practice to fulfil its purpose.
A practice success factor (PSF) is more than a task or activity, as it includes components of all four dimensions of service management. The nature of the activities and resources of PSFs within a practice may differ, but together they ensure that the practice is effective.
The information security management practice includes the following PSFs:
- developing and managing information security policies and plans
- mitigating information security risks
- exercising and testing information security management plans
- embedding information security into all aspects of the service value system.
2.4.1 Developing and managing information security policies and plans
Organizations develop and maintain information security policies and plans to sustain the required level of information security. These plans apply to everyone within the organization and might involve service consumers, suppliers, and partners. Therefore, an awareness and understanding of the applicable policies and plans should be sustained across the organization.
An organization should understand the internal and external requirements of information security, to develop and manage its policies and plans. An assessment of how these requirements affect an organization’s resources, products, services, and practices can then be performed, and the correct information security controls implemented. This activity will be continuously performed; due to the changing nature of both the information security requirements and the context of the organization. Changes in requirements and the sufficiency of policies and plans should be continually reviewed, on an interval-based and event-based basis. Improvements should be initiated based on these reviews.
Information security management policies and plans may address the following aspects:
- an overall information security management practice approach
- use and misuse of IT assets
- access control
- password control
- communications and social media
- malware protection
- information classification
- remote access
- suppliers’ access to an organization’s information and resources
- intellectual property
- record management and retention
- personal data protection
- other relevant aspects of information security.
To ensure the effective management of information security, organizations might establish a formal information security management system, which follows relevant standards such as ISO/IEC 27001[2]1.
2.4.2 Mitigating information security risks
The information security management practice includes the identification, analysis, and management of information security risks.
The identification of information security risks includes identifying all assets that are within the scope of the service value system, and then identifying risks to those assets. This can be supported by threat and vulnerability assessments, architecture and design reviews, and many other techniques.
The analysis of information security risks includes ascertaining the likelihood of each information security risk, and the potential impact of that risk. The data provided can evaluate the cost, benefit, and ROI of potential controls.
The management of information security risks includes defining and managing the controls, which manage the wide range of risks that might impact information security. This is performed in conjunction with risk management and other risk-focused practices, such as capacity and performance management, availability management, and service continuity management practices. The agreed information security controls are often implemented as part of other practices, such as service design, software development and management, infrastructure and platform management, architecture management, service request management, continual improvement, workforce and talent management depending on the nature of the control.
The established policies and plans should drive behaviour and implement controls to maintain a balance between:
- Prevention – ensuring that security incidents don’t occur
- Detection – rapidly and reliably detecting incidents that can’t be prevented
- Correction – recovering from incidents after they are detected.
More preventative countermeasures should be adopted if risk analysis indicates an earlier and greater impact on the service. If the initial impact is smaller and takes longer to develop, a more economically effective approach would be to invest in detection and correction countermeasures.
Controls may involve any of the four dimensions of service management. For example:
- organization and people controls such as training, policies, or separation of duties
- value stream and process controls such as backup, patch management, or peer review
- information and technology controls such as firewalls, encryption, or anti-virus software
- partner and supplier controls such as contractual requirements, process audits, or third-party certification.
When choosing an information security countermeasure, the effectiveness and efficiency of each option should be assessed. The effectiveness and efficiency of information security countermeasures must be continually controlled and validated.
2.4.3 Exercising and testing information security management plan
Experience has shown that untested plans do not work as intended, if it works at all. Therefore, testing is a critical part of the overall information security management practice. It is the only way to ensure that the plans and controls work in practice.
The information security plans and controls should be tested to improve its readiness and ability. Regular testing will result in the discovery of flaws and inefficiencies. The findings could then be used to update the information security plans and controls.
Exercises should be conducted at planned intervals and when significant changes occur in the policies, plans, and controls. The greater the impact of an information security incident, the more often the exercises should occur.
2.4.4 Embedding information security into all aspects of the service value system
The information security management practice must be embedded into every part of the service value system.
2.4.4.1 Guiding principles
When using the ITIL guiding principles, it is important to consider this practice. For example:
- focus on value: value can be realized through an improvement in the quality of information
- collaborate and promote visibility: also high-level consider information confidentiality.
2.4.4.2 Governance
Governance is essential for an effective information security management practice. Even the smallest organization needs to establish the governance of this practice to:
- establish the organization’s attitude to this practice
- define high-level requirements for this practice
- communicate high-level requirements to management
- monitor the organization to ensure that these requirements are being met.
2.4.4.3 Service value chain and value streams
Every value stream should include appropriate information security management practice activities. Usually, these will be embedded within the steps of the value stream and at multiple points in the service value chain.
For example, consider a value stream that creates a new or significantly changed service:
- acknowledge and document the service requirements (engage)
- this step will include documenting service requirements for information security
- decide whether to invest in the new service (plan)
- in this step, consider the information security issues that could pose a risk to the organization
- design the new service to meet customer requirements (design and transition)
- this step will include designing and architecting to meet security requirements
- build, configure, or buy service components (obtain/build)
- each component will need to be built, configured, or specified to meet security requirements
- deploy service components in preparation for launch (design and transition)
- deployment should be secure, to ensure components haven’t been tampered with
- release new service to customers and users (deliver and support).
- users and IT staff may require training, including security training, as part of the release.
2.4.4.4 Practices
Every practice needs to include aspects of information security management. This could relate to any of the four dimensions of service management.
Processes defined by a practice might need to include this practice’s activities. For example, the deployment process might need to include checks to ensure that the software components are untampered.
Roles defined by the practices might need to include skills and competences from this practice. For example, a software developer might need the ability to design software that meets defined security standards.
Information and technology used by a practice must meet security requirements and often require embedded security controls. For example, a tool used for information exchange in the incident management practice might need to be confidential, so staff can see their organization’s incidents but not those of other organizations.
Partners and suppliers that support a practice must meet the organization’s information security requirements. For example, a partner that provides service continuity arrangements might need to provide assurance that their staff do not make use of data that was provided to them as part of a continuity test.
2.4.4.5Continual improvement
The information security management practice, like every other practice, requires continual improvement. In a world of increasing threats and increasing dependency on IT services, it is essential to constantly monitor and improve information security.
All improvement activities, even those that have no specific information security management practice content, should be assessed for their potential impact on information security. This assessment should be a routine part of any improvement activity.
2.5 Key metrics
The effectiveness and performance of ITIL practices should be assessed within the context of the value streams that each practice contributes to. As with the performance of any tool, the practice performance can only be assessed within the context of its application. However, tools can differ greatly in quality; and these differences define a tool’s potential or capability to be effective when used according to its purpose. Further guidance on metrics, key performance metrics (KPIs), and other techniques that can assist with this can be found in the measurement and reporting practice guide.
Key metrics for the information security management practice are mapped to its PSFs. They can be used as KPIs in the context of value streams to assess the contribution of the practice to the effectiveness and efficiency of those value streams. Some examples of this are given in Table 2.3.
Table 2.3 Example of key metrics for the practice success factors
Practice success factor | Key metrics |
---|---|
Developing and managing information security policies and plans | Percentage of products and services with clearly documented information security requirements Percentage of products and services with documented information security plans Updating information security plans in a timely manner |
Mitigating information security risks | Number and percentage of information security risks for which analysis and evaluation have been performed Number and percentage of information security risks where the residual risk has been reduced to an acceptable level by implementing controls |
Exercising and testing information security management plans | Number and percentage of information security management plans that have been tested in the previous 12 months Number of improvement actions identified as a result of testing information security management plans |
Embedding information security in all aspects of the service value system | The governing body has discussed information security management at least once in the previous three months Number and percentage of value streams that include specific steps and activities for information security Number and percentage of practices that include specific steps and activities in its process flows and role definitions for information security Number and percentage of improvement activities that include a security assessment |
The correct aggregation of metrics into complex indicators will make it easier to use the data for the ongoing management of value streams, and for the periodic assessment and continual improvement of the information security management practice. There is no single best solution. Metrics will be based on the overall service strategy and priorities of an organization, as well as the goals of the value streams to which the practice contributes.
[1] This definition is different from the one used for the availability management practice. Service availability is defined differently from the availability of information.
1 https://www.iso.org/obp/ui/#iso:std:iso-iec:27001:ed-2:v1:en [Accessed 3rd February 2020]
3. Value Streams and processes
3.1 Value streams contribution
Like any other ITIL management practice, the information security management practice contributes to multiple value streams. It is important to remember that a value stream is never formed from a single practice. The information security management practice combines with other practices to provide high-quality services to consumers. The information security management practice contributes to all activities of the service value chain.
The contribution of the information security management practice to the service value chain is shown in Figure 3.1.

3.2 Processes
Each practice may include one or more processes and activities that may be necessary to fulfil the purpose of that practice.
Definition: Process
A set of interrelated or interacting activities that transform inputs into outputs. A process takes one or more defined inputs and turns them into defined outputs. Processes define the sequence of actions and their dependencies.
Many information security management practice activities are embedded into processes from other practices. For example:
- designing security into new and changed IT services is part of the service design practice
- integrating security controls into applications is part of the software development and management practice
- ensuring that people are entitled to use a service before granting them access is part of the service request management practice.
The information security management practice forms two processes:
- security incident management
- audit and review.
3.2.1 Security incident management
There are many different types of security incidents. This ranges from a single client device that is impacted by a virus, to an attack that causes critical damage to a national infrastructure, or a major breach of highly sensitive information.
Minor security incidents are typically managed in the same way as any other incident, following the incident handling and resolution process described in the ITIL incident management practice guide. More significant security incidents might require specialist management, which can be based on the process described here.
Each organization should define a criteria to determine whether an incident requires specialist security incident management or can be managed using the normal incident handling and resolution process.
This process includes the following activities listed in Table 3.1 and transforms the following inputs into outputs.
Table 3.1 Inputs, activities, and outputs of the security incident management process
Key inputs | Activities | Key outputs |
---|---|---|
Information security policy Service and asset information Monitoring and event tools Security incident and event management (SIEM) tools Escalations from service desk Known good sources of data and applications | Preparation Detection and reporting Triage and analysis Containment and recovery Post-incident activity | Incident response plans Supplier contracts Incident notification to regulators, governance bodies, or other relevant parties Restored information and services Incident reports Improvement suggestions |
Figure 3.2 shows a workflow diagram of the process

These activities might be performed with varying levels of formality by many people within the organization.
Table 3.2 provides examples of the process activities.
Table 3.2 Activities of the security incident management process
Activity | Example |
---|---|
Preparation | Before a security incident occurs, the organization must perform actions to prepare for potential future security incidents. This includes: defining and communicating the policies and procedures for security incident managementidentifying critical services and assets for which specific response plans may be neededagreeing communication that will occur during a security incident, including communications with: governing bodies, regulators, law enforcement, press, customers, internal staff, users, suppliers, and any other affected stakeholdersdefining how security incidents and breaches will be reportedidentifying threats and vulnerabilities that need to be manageddocumenting incident response plans for specific scenariosengaging partners and suppliers to provide products and services that may be needed to support specific scenariostesting incident response plans. |
Detection and escalation | Information security incidents might be: detected by monitoring tools, supported by correlation tools, and supported by security incident and event management (SIEM) tools. Incidents may also be detected by people; these may be reported to the service desk, or to a security incident response team, depending on who has detected the incident and the nature of the incident.The incident is escalated to the appropriate person or team, depending on the specific incident response plan. This may involve assembling a computer security incident response team (CSIRT). If required, an initial notification is sent to the appropriate regulatory or governance authorities. |
Triage and analysis | Evidence might need to be preserved for possible use in future court proceedings. To prevent contamination, forensic data must be collected before any analysis is performed. The nature and severity of the security incident is ascertained by examining systems, endpoints, applications, log files, and so on.If required then further notification may be sent to regulatory or governance authorities, when the nature and severity of the incident are understood. |
Containment and recovery | The impacted systems and services are isolated from the internet and/or from the rest of the organization. This enables further analysis to occur, which simultaneously limits the risk of further damage.If possible, then services might be restored using alternative systems.After analysis is complete, the impacted systems are shutdown, storage is wiped, and the systems rebuilt from well-known and reliable sources.Business processes are considered to be recovered when this can be performed without threat of another incident, or further damage from the original incident. |
Post-incident activity | Systems and services are monitored to ensure that the threat has been removed. Lessons learned analysis is performed to identify improvement opportunities. An incident report is created and shared as appropriate. |
3.2.2 Audit and review
Audit and reviews are regularly performed and follow a schedule. It might also be triggered by a major incident, or by the findings from a threat assessment or vulnerability assessment.
This process includes the activities listed in Table 3.3, and transforms the following inputs into outputs.
Table 3.3 Inputs, activities, and outputs of the audit and review process
Key inputs | Activities | Key outputs |
---|---|---|
Business process information Threat assessment information Service and asset information External standard(s) Current controls Vulnerability assessment information | Identify changes to business, technology, or threat environment Identify missing controls Assess control effectiveness Create audit report | Improvement suggestions Audit report |
Figure 3.3 Workflow of the audit and review process

These activities might be performed by internal or external auditors. Many organizations perform internal audits and implement improvements. External auditors can then perform a more formal audit.
Table 3.4 provides examples of the process activities.
Table 3.4 Activities of the audit and review process
Activity | Example |
---|---|
Identify changes to business, technology, or threat environment | Business processes are assessed to identify changes that could impact information security requirements.Technology is assessed to identify new or changed technology, as well as technology that has become obsolete, and changes in vulnerabilities related to technology. This assessment considers all technology used by the organization, not just information technology (IT).Changes to the threat environment are identified by a threat assessment. |
Identify missing controls | The business, technology, and threat environments are analysed, and recommended controls are identified. Most organizations use a standard such as ISO/IEC 27002 or NIST 800-53 as a beginning for a list of suggested controls that should be in place. The output of a vulnerability assessment might also identify missing controlsThe list of recommended controls is compared to the existing controls and improvements are recommended. |
Assess control effectiveness | Each existing control is assessed to identify potential vulnerabilities in how it has been implemented. These vulnerabilities could relate to the scope of the control, such as whether it has been deployed everywhere it should be. It could also relate to the configuration of the control, such as whether it provides the appropriate level of protection.The method used to assess effectiveness depends on the type of control. For example:Evaluate technical controls using a vulnerability assessment.Evaluate policy and process controls by reviewing records and interviewing staff.Review access rights by comparing directory information with records of granted access requests.Analyse the value of training by testing staff knowledge.Ensure third parties and suppliers have undergone an appropriate evaluation by a formal assessment body.Identify ineffective controls by assessing the output of a vulnerability assessment.New and improved controls are recommended based on the findings from this effectiveness assessment. |
Create audit report | An audit report is created based on the findings from the earlier stages. This report includes high-level information that can be provided to the governing body of the organization, as well as detailed recommendations for new and improved controls. |
4. Organizations and people
4.1 Roles, competencies, and responsibilities
The practice guides do not describe the practice management roles such as practice owner, practice lead, or practice coach. They focus instead on the specialist roles that are specific to each practice. The structure and naming of each role may differ from organization to organization, so any roles defined in ITIL should not be treated as mandatory, or even recommended. Remember, roles are not job titles. One person can take on multiple roles and one role can be assigned to multiple people.
Roles are described in the context of processes and activities. Each role is characterized with a competency profile based on the model shown in Table 4.1.
Table 4.1 Competency codes and profiles
Competency code | Competency profile (activities and skills) |
---|---|
L | Leader Decision-making, delegating, overseeing other activities, providing incentives and motivation, and evaluating outcomes |
A | Administrator Assigning and prioritizing tasks, record-keeping, ongoing reporting, and initiating basic improvements |
C | Coordinator/communicator Coordinating multiple parties, maintaining communication between stakeholders, and running awareness campaigns |
M | Methods and techniques expert Designing and implementing work techniques, documenting procedures, consulting on processes, work analysis, and continual improvement |
T | Technical expert Providing technical (IT) expertise and conducting expertise-based assignments |
4.1.1 Chief information security officer role
Many organizations have a board member who is responsible for the information security management practice. This role is usually called a chief information security officer (CISO).
The CISO is typically responsible for:
- establishing the overall information security strategy for the organization, based on an understanding of the organizations business strategy, and the information security risks that might impact this
- ensuring that the organization takes a balanced approach to information security, which provides sufficient protection without having an adverse impact on the ability to conduct business
- strategic communication about information security to the board, and to other stakeholders such as regulators, law enforcement, press, customers, suppliers, and partners
- developing the information security policies and procedures
- overseeing the staff responsible for all other aspects of information security, including:
- developing, testing, and improving processes, especially for security incident management
- selecting, testing, and deploying security products such as firewalls or anti-virus software
- defining standards and guidelines for procuring, developing, testing, deploying and the ongoing management of infrastructure and applications that have security implications, such as servers, operating systems, SaaS products, in-house applications, middleware, and client devices
- operational activities such as security event monitoring, and routine management of security products.
4.1.2 Other roles involved in information security management
Examples of other roles that can be involved in the information security management practice are listed in Table 4.2 below, together with the associated competency profiles and specific skills.
Table 4.2 Examples of roles with responsibility for information security management activities
Activity | Responsible roles | Competency profile | Specific skills |
Security incident management process | |||
Preparation | CISOInformation security manager Security analystCSIRT team member | LMCT | Organizational knowledge Policy and process development |
Detection and reporting | Security analyst Technical analyst Service desk agent | CAT | Recognizing security incidents and appropriately categorizing it Assembling a team and communicating clearly |
Triage and analysis | CISOInformation security manager Forensics specialist Security analyst Technical analyst | TMA | Business prioritization Forensic data preservation Technical understanding of services and their components Analysis of complex systems and information sources |
Containment and recovery | Information security manager Security analyst Technical analyst | TCM | Technical understanding of services and their components Evaluation and selection of alternative courses of action in complex environments Communication and coordination with multiple stakeholders |
Post-incident activity | CISO Information security manager Security analyst | CTL | Communication and coordination with multiple stakeholders Technical understanding of services and their components Prioritization of improvement opportunities |
Audit and review process | |||
Identify changes to business, technology, or threat environment | CISOInformation security manager | TMC | Understanding of business processes and priorities Understanding of current and emerging technologies Understanding of current and emerging threats |
Identify missing controls | Information security manager Information Security auditorSecurity analyst | TM | Understanding of applicable security standards, including detailed understanding of security controls Technical understanding of services and their components Analytical skills |
Assess control effectiveness | Information security manager Information Security auditorSecurity analyst | TMC | Understanding of applicable security standards, including detailed understanding of security controls Technical understanding of services and their components Communication and audit skills Analytical skills |
Create audit report | Information security manager Information Security auditorSecurity analyst | TCA | Evaluating and prioritizing improvement opportunities Communicating with a wide range of stakeholders, including senior management |
4.1.3 Security competence for all roles
Everyone within an organization has some responsibility for the information security management practice. Every role should include some security management requirements. Those who are aware of their information security management practice capabilities can contribute to:
- Preventing information security incidents and breaches by following all required policies, implementing required controls, and noticing and reporting vulnerabilities
- Detecting information security incidents and breaches by noticing and reporting the unusual behaviour of technology, people, or suppliers
- Correcting information security incidents and breaches by following the required processes and procedures when incidents occur.
People can also contribute to each of these in a negative way, if they don’t have the appropriate skills, competence, and motivation. There are many things that can be done to help ensure that everyone in the organization contributes to information security in a positive way.
4.1.3.1 Security awareness training
Security awareness training should help staff recognize risks and take the appropriate actions. The training typically includes issues such as:
- user authentication, password safety, multifactor and biometrics
- secure web browsing and use of social media
- appropriate use of email, phones, and other communication channels
- endpoint security, including phones, tablets, laptops, use of removable media, personal devices, and so on
- remote and mobile working, including use of public Wi-Fi
- social engineering, phishing, and identity theft
- malware, including: viruses, ransomware, keyloggers, adware, spyware, and so on.
- advanced persistent threats
- personally identifiable information (PII) and data privacy
- classification and appropriate handling of information and other assets
- security incident reporting and management
- understanding relevant parts of the organization’s information security policies and controls.
Security awareness training should be held regularly, as well as for new staff. Some organizations have annual refresher training that covers the entire required material. Other organizations deliver more regular training that only covers part of the material in each training event, but include everything needed over the course of a year.
4.1.3.2 Security requirements in every job description
Every job description should include appropriate security activities. Some of these activities will be generic and the same for everyone. Others will be specific to the role that staff have within the organization.
4.1.3.3 Regular reinforcement of security information
Regular reinforcement of security information ensures that security is at the forefront of the staffs’ mind at critical moments. This reinforcement can be in the form of posters, screen savers, emails, management briefings, or any other method that is appropriate to the organization’s culture.
4.2 Organizational structures and teams
In organizations with a dedicated IT department, the role of the CISO is usually outside of IT, to ensure that the scope of the practice is not simply restricted to IT. Typically, the CISO will have a number of direct reports, who are able to develop policies and processes, perform security audits and provide information security guidance to other staff.
Many organizations have a dedicated IT security team, that provides expertise across the whole of the organization, but it is also important to have information security expertise in other IT teams. For example:
- Service architects and service designers must be able to architect and design secure IT services. They must possess enough knowledge and understanding to perform much of the work themselves, even if they might require assistance from specialist security staff.
- Application developers must be able to write secure code. This requires an understanding of secure coding practices and of common mistakes to avoid.
- Service desk staff must be able to recognize security incidents, and take appropriate action based on the organization’s security policy and security incident response plans.
- All staff must be aware of their responsibility to detect common security attacks and know how they should react to these attacks.
5. Information and technology
5.1 Information exchange
The effectiveness of information security management is based on the quality of the information used. This information includes, but is not limited to, information about:
- consumer’s business processes
- services, its architecture, and design
- partners and suppliers, and information on the services they provide
- regulatory requirements regarding information security
- technology and services available on the market, which might be relevant to information security
- security standards and best practices.
This information may take various forms. The key inputs and outputs of the practice are listed in section 3.
5.2 Automation and tooling
In some cases, the information security management practice can benefit from automation. Where this is possible and effective, it may involve the solutions outlined in Table 5.1.
Table 5.1 Automation solutions for information security management activities
Process activity | Means of automation | Key functionality | Impact on the effectiveness of the practice |
---|---|---|---|
Security incident management process | > | ||
Preparation | Knowledge management tools and document repositories | Documenting and communicating policies, procedures, and incident response plans | Medium to very high, depending on the size and complexity of the organization |
Service catalogue and configuration management database (CMDB) | Identifying critical services and assets | Very high | |
Detection and reporting | Monitoring tools | Detecting possible security incidents | Essential |
Security incident and event management (SIEM) and correlation tools | Analysing data and detecting possible security incidents | Medium to very high, depending on the complexity of the services, applications and infrastructure | |
Intrusion detection systems (IDS) and intrusion prevention systems (IPS) | Detecting attacks, and responding with automated actions | High | |
Triage and analysis | Data forensic tools | Preserving evidence that may be needed in court proceedings | Could be anything from low to essential, depending on the legal and regulatory environment |
SIEM or log analysis tools | Analysing security events | Very high | |
Containment and recovery | Backup and recovery tools | Recovering data after a security event | Essential |
Definitive media library | Secure source of software and applications for use in recovery | Very high | |
Post-incident activity | Continual improvement register | Logging and tracking improvement suggestions | High |
Knowledge management tools and document repositories | Documenting and communicating incident information and lessons learned | Medium | |
Audit and review process | |||
Identify changes to business, technology, or threat environment | Process maps and process mapping tools | Documenting and communicating business processes | High |
Service catalogue and configuration management database (CMDB) | Identifying new or changed technology | High | |
Identify missing controls | Security audit tools or questionnaires Vulnerability assessment tools | Identify possible controls that might be needed | High |
Assess control effectiveness | Security audit tools or questionnaires Vulnerability assessment tools | Compare existing controls to good practice | High |
Create audit report | Knowledge management tools and document repositories | Documenting and communicating audit report | Medium |
Continual improvement register | Logging and tracking improvement suggestions | High | |
6. Partners and suppliers
Very few services are delivered using only an organization’s own resources. Most, if not all, depend on other services, often provided by third parties outside the organization (see section 2.4 of ITIL Foundation: ITIL 4 Edition for a model of a service relationship). Relationships and dependencies introduced by supporting services are described in the ITIL practice guides for supplier management and service level management.
Partners and suppliers might provide critical products and service components. The service provider needs to negotiate and agree information security requirements with partners and suppliers to meet information security requirements.
Partners and suppliers might also provide information security services and solutions, such as: vulnerability assessments, threat assessments, security incident management, provision of security relevant infrastructure or applications, and so on. In this case, they should also be involved in the testing and reviewing of these services and solutions.
If suppliers have access to the organization’s network, servers, or other resources, it could be a security breach. This risk needs to be identified and controlled. Typically, this is controlled with:
- network isolation: preventing the supplier from accessing more sensitive parts of the network
- strong authentication and encryption: preventing the supplier from accessing sensitive data and systems
- contractual terms with regular audits: ensuring the supplier understands what is expected of them and meets these expectations.
7. Important reminder
Most of the content of the practice guides should be taken as a suggestion of areas that an organization might consider when establishing and nurturing their own practices. The practice guides are catalogues of topics that organizations might think about, not a list of answers. When using the content of the practice guides, organizations should always follow the ITIL guiding principles:
- focus on value
- start where you are
- progress iteratively with feedback
- collaborate and promote visibility
- think and work holistically
- keep it simple and practical
- optimize and automate.
More information on the guiding principles and their application can be found in section 4.3 of the ITIL® Foundation: ITIL 4 Edition.