Você está na página 1de 7

A Code of Practice for Effective Information Security

Risk Management Using COBIT 5

Walid Al-Ahmad Basil Mohammed


Gulf University for Science & Technology Accenture
Mishref, Kuwait Dammam, Saudi Arabia
alahmed.w@gust.edu.kw basil.mohammed@accenture.com

Abstract—A low-level code of practice is presented in this Risk [5]. According to the market survey conducted by ISACA
paper to help information security (IS) risk management [6] to identify what guidance COBIT5 users most needed to
professionals manage enterprise IS risks effectively and help them obtain maximum value from the use of COBIT 5
efficiently using COBIT 5 framework1. The proposed code of framework, two main areas were highlighted, namely the need
practice is the result of the experience gained by the authors over for more guidance related to the COBIT 5 enablers and specific
years through working with clients in many industries topics where practical guidance related to COBIT 5 would be
implementing IS risk management using different international most helpful. The authors believe that the practical guidelines
standards and frameworks. COBIT 5 is supposed to serve as an presented in this paper serve this purpose.
umbrella framework that integrates knowledge and practice of
many other standards and frameworks. However, COBIT 5, like The remainder of this paper is organized as follows: section
many other frameworks, lacks detailed guidelines at the low-level 2 highlights the high-level ISRM processes; section 3 presents
activities carried out during IT risk management. This code of details of the ISRM process and its sub-processes; finally,
practice is proposed to fill in this gap. The recommended section 4, puts forward some conclusions and future research
guidelines and activities have been successfully used in real-world opportunities in relation to our work.
IS risk management projects.

Keywords— COBIT 5; Information Security; Risk II. OVERVIEW OF AN ISRM PROCESS


Management; Practical Guidelines; Risk Management Processes; A process can be viewed as a road map or a recipe that
shows what should be done, how to do it, who is responsible
I. INTRODUCTION for doing it, and when in the lifecycle it should be done. The
use of processes has been proven to be useful to achieve
There is no doubt that modern society and businesses
objectives in all fields. There is a consensus within the
depend heavily on information technology in nearly every facet
information security community about the common
of their activities. It is also widely accepted that enterprises of
components of a high level process for ISRM [3, 5, 7]. The
all kinds are increasingly exposed to various kinds of risks,
high level processes of the ISRM are depicted in the diagram
including information technology risks. In any enterprise, IS
shown in Figure 1. These processes are common to all risk
risks must be identified, evaluated, analyzed, treated and
management frameworks. We refer the readers to COBIT 5 or
properly reported. Therefore, it is critical to establish reliable
ISO 27005 for more information about the description of these
information security risk management (ISRM) frameworks.
processes.
There are many security standards and frameworks available to
help organizations manage these risks. However, many Each of the high level processes is usually implemented
companies across the globe have already adopted COBIT 5 [1] using middle level sub-processes. The “Conduct Risk
as the primary business framework for the governance and Assessment” process is usually implemented using the
management of enterprise IT, including managing IS risks. In “Identify Risks”, “Analyze Risks”, and “Evaluate Risks” sub-
fact, COBIT 5 as a comprehensive framework has already processes. The implementation of these sub-processes further
incorporated and aligned with many standards and best depends on low level sub-processes, which are sometimes left
practices currently used such as ISO/IEC 31000 [2] and to enterprises to determine and implement. The focus of this
ISO/IEC 27000 series [3], among others. Other researchers work is on the implementation of these low level sub-
have also advocated further research on COBIT 5 and its use in processes. This is done by providing all the details related to
practice [4]. As suggested by its designers, COBIT 5 provides the risk assessment activities that the IS risk management
content with areas that need further elaboration and updates. professional needs to do. Where needed, detailed guidelines
This paper is an attempt to address some of the elaborations and procedures are provided to clarify how to carry out the
and updates related to IS risk management using COBIT 5 for activity. Moreover, clear explanations of the tasks is provided
and roles are assigned to these tasks as well. It is assumed that
1
Throughout this paper, the quoted text from COBIT® 5 for Risk, the low level sub-processes are implemented sequentially in an
Appendix C, is used with permission. All rights reserved © ISACA, iterative manner. The approach outlined in the next section is
based on leading practices, namely ISO 27005 and COBIT 5.0

ISBN: 978-1-4673-6988-6 ©2015 IEEE 145


for Risk. Major effort was made to align the approach with tools. Following the agreement on the data collection method,
COBIT 5.0 for Risk. This approach is intended to be adaptive an understanding of data classification (in terms of
and evolving and used to govern information security risk importance, relevance, etc.) and analysis approach must be
assessments within the defined scope. considered.
Outcome: Established method for IS risk-related data
collection, classification, and analysis. This can be
documented in the form of a process owned and managed by
ISRM team.

Sub-Process [1.1.2]: “Record relevant data on the enterprise’s


internal and external operating environment that could play a
significant role in the management of Information Security
risk.”
Description: ISRM team should identify internal/external
requirements related to the enterprise operating environment
(direction received from parent company, regulations of the
country of operation, considerations of cross relations with
other peer companies, direction received from senior
management and the board of directors)
Outcome: Detailed list of ISRM-related requirements in
relation to the operating environment of the enterprise.
Sub-Process [1.1.3]: “Survey and analyze the historical
Information Security risk data and loss experience from
externally available data and trends, industry peers through
Fig. 1. High Level IS Risk Management Processes industry-based event logs, databases, and industry agreements
for common event disclosure.”

III. LOW LEVEL PROCESSES Description: In order to have insights on the IS risks, and to
take into consideration the nature of the business and industry,
the ISRM team to survey available public information related
This section presents the low level processes used in the IS to IS risks in peer companies, analyze published IS risk trends,
risk management along with their corresponding activities and and outreach to similar other companies to understand the IS
guidelines to implement them. Each of the following sub- risks associated with similar environments.
sections introduces the high level and middle level processes to
which the low level sub-processes belong and a table to Outcome: Understanding of IS risks associated with similar
describe and detail the activities of the low level sub-process. industry. This should be maintained in the risk register.
The process ID and Practice ID references in the tables refer to Sub-Process [1.1.4]: “Record data on risk events that have
COBIT 5 for Risk processes [5]. caused or may cause impacts to Information Security
benefit/value enablement, Information Security program and
A. Establish Scope and Boundaries project delivery, and/or Information Security operations and
service delivery.”
TABLE I. COLLECT DATA Description: In addition to considering the IS risks associated
Practice [1.1] Collect Data with the industry, ISRM team needs also to capture IS risks
COBIT 5.0 Process ID APO12 Process Manage Risk that already exist in the enterprise that were previously
Reference identified as part of an internal assessment or an external audit
Input Management direction of a compliance check. Also, data recorded on incidents,
Output Detailed Information Security Risk Assessment Scope problems and investigations should be taken into consideration.
References None Outcome: Inventory of potential IS risks based on previously
Sub-Process [1.1.1]: “Establish and maintain a method for conducted assessments. This should be maintained in a risk
collection, classification, and analysis of Information Security register format.
risk-related data.” Sub-Process [1.1.5]: “Organize and categorize the collected
Description: The quality of the data collected and used for the Information Security risk data.” & “Determine the specific
IS risk assessment is a critical success factor for the conditions that existed or were absent when risk events
assessment. Accordingly, the step of data collection should be occurred and the way the conditions affected event frequency
properly planned for. The ISRM team must agree on the and loss magnitude.”
methods to be used for data collection that best fit into the Description: Based on the data collected on IS risks from
enterprise environment. This includes questionnaires, on-site similar enterprises and the enterprise specific previous
interviews, document review and use of automated scanning experience, ISRM team to analyze this data and provide

ISBN: 978-1-4673-6988-6 ©2015 IEEE 146


recommendations on focus areas for IS risk assessment. This Ref (1.1.5.2) - In order to identify IS processes in scope for the
step would identify the scope for the IS risk assessment to be assessment, the enterprise ISRM team needs to:
conducted with specific scope for the enterprise needs. ISRM • Consider IS general processes for the assessment that are
team needs to: aligned with IS risk universe (ref COBIT 5 for IT general
(1.1.5.1) Identify critical assets and the related information. processes)
The assets can be hardware, software, services (processes), • Agree with IS Risk Manager on the depth and breadth of
personnel, and third party service providers. the IS risk assessment for the IS general processes.
(1.1.5.2) Identify the IS processes in scope for the assessment • Document the IS processes in scope in an inventory with
(change management, access management, etc.) clear justification for inclusion per process, ownership,
(1.1.5.3) Collect supporting information on the IS risk and scope for the assessment.
environment which includes but not limited to: • Set/update the assessment dates for all IS processes
• Systems description (included or excluded for tracking and monitoring
• Organizational IS policies and procedures purposes).
• Current network topology Ref (1.1.5.3) – The IS risk assessment requires background
• Technical controls used for IS Systems (Example: Built- information that would give insights on the environment and
in or add-on security product) the existing controls. ISRM team needs to:
• Management controls used for IS Systems (Example: • Creates pre-assessment requirements document
Rules of behavior) • Circulate to concerned divisions/departments in the
• Operational controls used for IS Systems (Example: enterprise
Backup and recovery operations) • Collect the requested documentation.
• Physical and environmental security mechanisms • Check collected data for appropriateness in terms of
(Example: Facility Security, Controls for humidity, water, coverage and quality of content.
and power) Ref (1.1.5.4) – The ISRM team needs to consolidate the data
(1.1.5.4) Consolidate and propose scope for the IS risk gathered on the assets, processes and other requested
assessment. The scope must be approved by IS Risk Manager. documentation to propose SoW for the IS risk assessment.
Outcome: Identification of focus areas and Scope of Work • Document the SoW
(SoW) for the IS risk assessment. • Collect IS Risk Manager approval
Guidelines: Ref (1.1.5.1) - In order to identify critical assets,
the enterprise ISRM team needs to: Sub-process [1.1.6]: “Perform periodic event and Information
• Review existing assets inventory (if exists) Security risk analysis to identify new or emerging risk issues
and to gain an understanding of the associated internal and
• Check the assets inventory appropriateness in terms of
external risk factors.”
coverage and quality of content.
Description: ISRM team to establish a process that would
• Review the existing Business Impact Analysis (BIA)
ensure the previous steps are conducted on periodic basis to
document (if exists)
keep reference information for security risks up-to-date.
• Check its appropriateness in terms of coverage and
Outcome: Process for keeping IS-risk related data current and
quality of content.
up-to date with set and agreed upon periodicity.
• Arrange for meetings and\or interviews with assets
inventory and BIA document owners to:
o Check that the inventory of assets and BIA are up- B. Conduct Risk Assessment
to-date.
o Understand how these documents were created and TABLE II. ANALYZE RISK

what controls are associated with them in terms of Practice [2.1] Analyze Risk
ownership and maintenance. COBIT 5.0 Process ID APO12 Process Manage Risk
o If there is no assets inventory in place, ISRM team to Reference
coordinate with concerned team(s) to create the assets Input Detailed Information Security risk assessment scope
inventory. Output Completed risk assessment registers
• For the IS assets in the inventory, ISRM team needs to References (1) Customized work plans, (2) Risk register template, (3)
Risk assessment map
select a subset for assets valuation and criticality
assessment. This subset has to be approved by the IS Risk Sub-Process [2.1.1]: “Define the appropriate breadth and
Manager. depth of risk analysis efforts, considering all risk factors and
• Conduct criticality and valuation assessment for the the business criticality of assets.”
selected assets. The assets criticality assessment criteria Description: The ISRM team needs to confirm the breadth
must be documented, reviewed at least on an annual basis, and depth of the intended risk assessment. This needs to be
and approved by IS Risk Manager before use. adjusted to emerging needs, management direction and other
• Complete the criticality assessment, discuss results with possible ad-hoc requirements (new systems, infrastructure
assets owners and collect their approval. changes, etc.) Management might decide to do the assessment

ISBN: 978-1-4673-6988-6 ©2015 IEEE 147


for specific IS processes and/or selected IS assets. For this proposed condition as per recommended activity
purpose, ISRM team would: reference.
(2.1.1.1) Customize the work plans to be used during the • Once all observation are consolidated and categorized per
assessment for each and every IS process. IS process, the IS Risk Senior Analyst to discuss with
(2.1.1.2) Collect input on the customized work plans from the concerned divisions for their confirmation on the
concerned divisions. identified issues.
(2.1.1.3) Analyze and review collected responses. Consolidate • The final list of observations is then shared with IS Risk
the identified gaps in observations format in preparation for Manager for final approval.
sharing the same with concerned divisions for final
confirmation. Sub-Process [2.1.2]: “Build and regularly update Information
Outcome: Completed customized work plans based on the Security risk scenarios - consider custom scenarios specific
agreed upon scope. The number of work plans at this stage for the enterprise.”
will depend on the IS processes/assets selected for assessment. Description: In order to have an effective risk assessment,
This step will also conclude with the identification and ISRM team needs to create and customize specific IS risk
consolidation of weaknesses that exist in the IS processes. scenarios that apply to the enterprise. The IS risk scenarios
Guidelines: Ref (2.1.1.1) - In order to customize the work should be based on the observations that were captured in step
plans, ISRM team needs to: [2.1.1] and take into consideration the previously collected
• Review existing work plans (in case current existing work data in [1.1.1] as well.
plans are previously defined) Outcome: Customized risk scenarios specific for the
• In case the scope is including a new IS process, related enterprise environment and IS challenges.
work plan needs to be created incorporating the areas Guidelines: Ref (2.1.2) – ISO 27005/COBIT 5.0 for Risk
(controls based on selected standard with most applicable provides generic IS risk scenarios that can be used in the risk
coverage). assessment process, however, it is recommended that the
• The customization exercise would consider: enterprise uses these scenarios for guidance in the course of
o Which processes/assets and related practices to development of customized IS risk scenarios. In order to do
include or exclude based on the scope. so, ISRM team needs to:
o Which activities or controls (in case of COBIT 5.0) • Define risk scenario categories specific for the enterprise.
to include or exclude based on the scope. This would take into consideration specific environment,
• The work plans need to be customized by the IS Risk business and IS challenges.
Analyst reviewed by the IS Risk Senior Analyst and • Provide detailed description for the defined risk scenarios
approved by IS Risk Manager. explaining how the proposed scenario would affect the
• ISRM team will be responsible for the maintenance of the enterprise business.
work plans and managing their life-cycle (revisions, • Make sure that:
versioning, updates, retirement, etc.) o Number of created risk scenarios is reasonable.
Ref (2.1.1.2) – With the customized work plans ready to use, o The risk scenarios are realistic.
ISRM team needs to: o Closely aligned with the observations consolidated
• Agree internally with IS Risk Manager on the approach to and data collected in [2.1.1] & [1.1.1]
use to collect responses on the work plans (conduct one- • Risk scenarios should be approved by IS Risk Manager.
to-one meetings, arrange for workshops, send over email, • Further reference is made to the created risk register
etc.) template containing the fields to be completed for each
• Agree with concerned parties (departments) on the best and every custom risk scenario.
setup that would be efficient and effective to collect their
input on the work plans. Sub-Process [2.1.3]: “Estimate the frequency and impact
• Where meetings are involved, plan for the meetings and associated with Information Security risk scenarios. This takes
collect needed input on the work plans. into account all applicable risks, evaluate known operational
Ref (2.1.1.3) – Once all responses are collected on the work controls and estimate residual risk levels.”
plans, ISRM team needs to: Description: In this step, the ISRM team with the
• Review the collected data and validate in terms of quality consolidated observations and customized risk scenarios in
and factuality. hand will be able to do the risk assessment:
(2.1.3.1) Create risk statements based on the consolidated
• Where the activity in the work plan is not in place,
observations.
highlight this as a gap that would require later treatment.
(2.1.3.2) For each risk statement created, map the risk to a risk
• Consolidate all the identified gaps in observations format
scenario from the risk scenarios categories.
and categorize per IS process:
(2.1.3.3) Evaluate the risk by estimating values for the impact
o An observation format would consider in referral to
of the risk and the likelihood of its occurrence.
the source of information (meeting, discussion, email,
(2.1.3.4) Consolidate the identified risks per IS process.
etc.) what was not found in place compared to the

ISBN: 978-1-4673-6988-6 ©2015 IEEE 148


Outcome: Detailed risk assessment that shows the identified (1) the current IS risks at the enterprise and (2) the enterprise
risks, enterprise risk scenarios, impact and likelihood of each acceptable level of risk:
risk in the register. (2.2.1.1) Review the risks captured in the risk registers.
Guidelines: Ref (2.1.3.1) – The ISRM team needs to: (2.2.1.2) ISRM team to agree on acceptable level of risk for
• Review the documented observations carefully, identify each risk. This should be approved by IS Risk Manager.
common points that can be grouped into one risk Outcome: Completed IS risk profile.
statement.
• Create risk statements taking into consideration that risk Sub-Process [2.2.2]: “Based on the risk profile data, define a
statements must: set of key risk indicators (KRI) that allow the quick
o Contain cause and effect phrases in each statement. identification and monitoring of current risk and risk trends.”
o Be short but precise statements. Description: The ISRM team needs to create a set of key risk
• All risk statements need to be documented in the risk indicators (KRIs) that would be used in a later stage for
register template. monitoring purposes.
Ref (2.1.3.2) – Once the IS risk statements are created, ISRM Outcome: Defined set of key risk indicators (KRIs) for IS
team needs to: risks captured in the enterprise risk profile.
• Map the risk statements to the created risk scenarios. Guidelines: Ref (2.2.2) – Creating key risk indicators would
• Customize risk scenarios as needed in order to require that ISRM team does the following:
accommodate new risks • Review IS risk profile and identify risk trends per area.
• If new risk scenarios are added, they need to be approved • Specify metrics or thresholds that would be considered
by IS Risk Manager. alerting and require ISRM attention. This should be
Ref (2.1.3.3) – As part of the risk evaluation, values must be aligned with the risk acceptance criteria:
given to the risk impact and likelihood of occurrence: o Example: under the IS process of change
• ISRM team needs to agree on the values to be assigned management one KRI to monitor the risks associated
for the risk impact. with change management process could be “the
• ISRM team needs to agree on the values to be assigned percentage of IS changes per month that are found
for the risk likelihood of occurrence. not complying with the enterprise IS change
management policy (or procedure)”
• The risk map to be used must be approved by the IS Risk
o If this KRI is set to 1% this would mean that the
Manager before proceeding further with the assessment.
enterprise is accepting that 1% of the changes per
• The combination of the values assigned for impact and
month might not be in compliance with the policy (or
likelihood will determine the estimated risk value. This
procedure)
will be set based on the risk map used, however, as a
general rule; the assessor can take the higher of the two as • Define the associated process of KRI reporting and/or
escalation of exceptions.
the overall risk value.
• Define a process for periodic review and update for
• Update the risk registers with the assessment results.
defined metrics.
Ref (2.1.3.4) – In order to give comprehensive oversight on
the identified risks, ISRM team needs to: • All defined metrics (KRIs) need to be prepared by the IS
Risk Senior Analyst and approved by IS Risk Manager.
• Create executive summaries for each risk register.
• Consolidate the summaries in one risk register that will be TABLE IV. ARTICULATE RISK
shared with other divisions.
Practice [2.3] Articulate Risk
• All registers and executive summaries need to be
COBIT 5.0 Process ID APO12 Process Manage Risk
approved by IS Risk Manager. Reference

TABLE III. MAINTAIN A RISK PROFILE


Input The enterprise Information Security risk profile
Output Communication plan
Practice [2.2] Maintain a Risk Profile References (1) IS Risk Registers, (2) IS Risk Executive Summaries,
COBIT 5.0 Process ID APO12 Process Manage Risk (3) IS Risk Profile
Reference
Input Completed risk assessment registers Sub-Process [2.3.1]: Share the risk profile and KRIs with all
Output ENTERPRISE IS risk profile & KRIs
affected stakeholders in terms and formats useful to support
References (1) IS Risk Registers, (2) IS Risk Executive Summaries
decisions. This should include risks, gaps, remediation status,
and their impacts on the overall IS risk profile.
Sub-Process [2.2.1]: Capture all risk profile information and
Description: The ISRM process is owned by the ISRM team,
consolidate into a risk profile. Include the status of the risk
however, it is critical to make sure that the results of the risk
action plans (in case previously defined) in the Information
assessment are timely and adequately shared with the
Security risk profile of the enterprise.
concerned divisions who will take (1) part of the risks
Description: Based on the data collected and the effort spent
treatment responsibility (2) ownership of some identified risks
creating the risk registers, ISRM team will be able to create
the IS risk profile. The IS risk profile typically would contain

ISBN: 978-1-4673-6988-6 ©2015 IEEE 149


(3) use the content of the risk profile in decisions making (4) TABLE VI. RESPOND TO RISKS

Support in KRIs monitoring Practice [3.2] Respond to Risk


Outcome: IS Risk profile and KRIs communication plan with COBIT 5.0 Process ID APO12 Process Manage Risk
concerned stakeholders (departments). Reference
Input Detailed risk treatment plan
Output Risk response plan
C. Risk Treatment References IS Risk Register containing the risk treatment plan

TABLE V. DEFINE RISKS ACTION PLAN Sub-Process [3.2.1]: “Prepare and maintain plans that
Practice [3.1] Define Risk Action Plan document the specific steps to take to address and respond to
COBIT 5.0 Process APO12 Process Manage Risk a risk event that may occur.”
Reference ID Description: In order to minimize the impact of a risk on the
Input The enterprise IS risk profile enterprise operations and ensure it is properly planned for, a
Output Detailed risk treatment plan detailed action plan must be documented which would be
References (1) IS Risk Registers, (2) IS Risk Executive Summaries, subject for monitoring in order to ensure: 1) it is adequate and
(3) IS Risk Profile
effectively addressing the risk 2) implemented as planned.
Exceptions to the plan must be justified and shared with IS
Sub-Process [3.1.1]: “Decide on the risk treatment option(s)
Risk Manager for approval.
and consider the activities to address identified risks in line
Outcome: IS Risk response action plan(s).
with the enterprise risk tolerance. Map treatment options to
Guidelines: Ref (3.2.1) – The ISRM team needs to follow up
specific Information Security risk statements.”
with risk owners to provide detailed action plans for risk
Description: ISRM team needs to ensure that risk treatment
remediation. These plans must be provided in reasonable time
plans based on the available risk treatment options are defined.
with reasonable target dates. The risk owners would be liable
This should take into consideration the enterprise IS risk
for timely implementation of the action plans:
tolerance (the enterprise IS risk tolerance is the amount of risk
the company is willing to accept in a certain specific IS • Use the risk register template to document the details of
process). For each identified risk in the risk profile a decision the action plans.
should be made on how to treat the risk. There are several o Check the plans for quality and effectiveness.
treatment options that include: 1) risk avoidance, 2) risk • Closely monitor the performance of the actions plans.
acceptance, 3) risk transfer, 4) risk mitigation. Cost-benefit • Request justifications for exceptions and retargeted dates.
analysis is usually used to select the best option; however, any • Report exceptions to IS Risk Manager for approval.
option to be selected must take into consideration the • Provide a balanced set of proposals and initiatives
enterprise business nature and operating environment. designed to reduce risk considering cost/benefits, effect
Outcome: IS Risk treatment plan documented on the IS risk on current risk profile and regulations.
register template.
Guidelines: Ref (3.1.1) – The ISRM team will use the IS risk D. Communicate Risks
register template to document the risk treatment plans:
• There are usually four options to consider: TABLE VII. COMMUNICATE RISKS
o Risk avoidance: terminate the activity leading to risk.
o Risk acceptance: simply accept the risk Practice [4.0] Communicate Risk
COBIT 5.0 Ref. Process ID APO12 Process Manage Risk
o Risk transfer: transfer risk to another party.
o Risk mitigation: mitigate risk with appropriate Input Detailed IS risk register
control measures or mechanisms Output IS Risk Report
References IS risk register containing risks, risk assessment, risk
• The documented plans need to be created by the IS Risk treatment and response plan
Senior Analyst and approved by IS Risk Manager.
• Since the plans would include actions from other Sub-Process [4.1]: “Report on the risk profile (identified
departments/divisions, ISRM team needs to consider risks, risks assessment, treatment, and overall risk exposure)
sharing these plans with concerned parties for input and and the associated KRI’s to all concerned stakeholders
action as needed. (internal/external).”
• Detailed justification for the selected option must be Description: ISRM team needs to create a report on the risk
documented in the risk register template. assessment that was conducted and communicate it to other
internal/external stakeholders. The report can include in
addition to the details related to the risk values a description of
the scope that was covered, objectives of the assessment,
status of previous assessment results related to the identified
risks and most importantly an introduction to the approach and
methodology that ISRM team adopted in the assessment. The
risk assessment report can also highlight the challenges that

ISBN: 978-1-4673-6988-6 ©2015 IEEE 150


were faced during the assessment and suggest what to be done current status and indicators of any immediate or
differently next time to improve the overall risk assessment impending threat that requires attention.
results. • Dashboards or heat charts are often used to show an
Outcome: IS Risk Report overall assessment of the risk posture
Guidelines: Ref (4.1) –ISRM team needs to consider the • Whatever the form of reporting, ISRM team needs to
following: ensure that this reporting takes place and the results are
• The assessment report should state the scope, objectives, analyzed adequately and acted on appropriately in a
period of coverage and nature, timing and extent of the timely manner.
assessment work. • This responsibility includes:
• The report should state the risks, conclusions, and o Identifying the types of events that will trigger
recommendations in simple statements avoiding reporting required by both external (law
complexity. enforcement) and internally.
• When issued, the report should be approved and signed
by the IS Risk Manager, dated, and distributed according
to the agreed upon protocols within the enterprise. IV. CONCLUSIN
• Communication channels are established for reporting and A code of practice to implement low level activities have
disseminating the risk assessment report. been introduced in this paper to use COBIT 5 for risk
successfully to manage IS risks within an enterprise. The code
of practice has filled the gaps in the COBIT 5 framework with
E. Monitor and Review Risks respect to details and guidelines when implementing the
framework. The code of practice proposed in this paper has
TABLE VIII. MONITOR AND REVIEW RISKS been used in many real-world projects in different industries
Practice [5.0] Monitor and Review Risks
and has proven to be effective and useful. It is hoped that
COBIT 5.0 Process APO12 Process Manage Risk ISACA will adopt some of these guidelines and incorporate
Reference ID them in COBIT 5 for Risk in future versions. The
Input KRI’s and other controls information
recommendations and guidelines presented in this paper serves
Output Reporting on KRI’s performance and any other exceptions
as the basis for further investigation and elaborations by ISRM
References (1) IS risk profile, (2) IS risk assessment report practitioners on the same.

Sub-Process [4.1]: Monitor the effectiveness of controls as REFERENCES


part of an ongoing effort to manage IS risks. [1] ISACA (Information Systems Audit & Controls Association), COBIT 5,
Description: An important component of the risk ISACA Publication/ United States, 2012.
management life cycle is continuously monitoring, evaluating [2] ISO (International Standards Organization), Risk Management –
Principles and Guidelines, ISO/IEC Publications, Switzerland, 2009.
and assessing risk. The results and status of this ongoing
[3] ISO (International Standards Organization), Information Technology –
analysis needs to be documented and reported to IS Risk Security Techniques – Information Security Risk Management, ISO/IEC
Manager on a regular basis. To facilitate such reporting, visual Publications, Switzerland, 2008.
aids such as graphs or charts and summarized overviews on [4] S. De Haes, W. Van Grembergen, and R. Debreceny, “COBIT 5 and
KRI’s can be used. Exceptions requiring senior management Enterprise Governance of Information Technology: Building Blocks and
attention or the involvement of other stakeholders need to be Research Opportunities,” Journal of Information Systems, vol. 27, pp.
307–324, 2013.
communicated timely through the defined communication
[5] ISACA (Information Systems Audit & Controls Association), COBIT 5
channels. for Risk, ISACA Publication/ United States, 2013.
Outcome: Reporting on KRI’s performance and any possible [6] S., Chatterji, “COBIT 5 Market Guidance: What Next?”, COBIT Focus,
exceptions. http://www.isaca.org/cobit/focus/, 2014.
Guidelines: Ref (5.1) –ISRM team needs to consider the [7] NIST (National Institute of Standards and Technology), Managing
following: Information Security Risks, NIST Special Publication 800-39/United
States, 2011.
• Senior management will typically have little interest in
technical details and is likely to want an overview of the

ISBN: 978-1-4673-6988-6 ©2015 IEEE 151

Você também pode gostar