<< back to Journal Home
     
 

Information Security Aligned To Enterprise Management





Istikoma
Nurul Fahimah Bt Fakhri
Qurat-ul-Ain
Jamaludin Ibrahim



Kulliyah of Information Technology,
International Islamic University,
Malaysia

Correspondence:
Istikoma
Kulliyah of Information Technology,
International Islamic University,
Malaysia
Email: jannahnaty@yahoo.com




Abstract

This paper illustrates business aligned security approach as a key element of an enterprises's overall business strategy. Business information security is a crucial concern in enterprise management for risk handling operation. Te modern era of technology security for businesses is increasingly recognized especially in business strategies. Disconnection of information security procedures and commercial strategic business objectives effects to control security spending and their risk, incidents and losses. Operational enterprise system requires aligning security practices through embedding information security risk management into the organization, however it faces major challenges to support and enable the business. Alignment security in business process is one of the biggest challenges in good organization as it needs support resources and time management and ways to align security to overcome business objectives. Thus, an information security management role is important as a guideline to execute Business Information Security. In addition, the systematic security management introduces a business model for critical information infrastructure protection. Organization design and strategy, people, process and technology are the elements of the model which play an effective role in information security but it requires a balance among them.

Key words: business aligned security, enterprises overall business strategy, business information security, information security risk management, information security management(ISM).



Introduction
Nowadays, the important of information security in enterprise environment has a huge impact. Information security has become more crucial by most organizations for risk mitigation action. The activity of protecting business must be the first and foremost of achievement in any security program. This view has been supported by the security profession, security approaches and government processes used. The information security vocation grew out of the review profession, compliance and regulatory groups, and public security agencies, which has the profession as the risk-centric of security. Due to some issues several enterprises have not made it a core competency. This is because the limitation of organization must open the realization for some organization as to the importance of their security in order to achieve business goals as vital and actively engage business stakeholders in the security issue. As a result it has become an untied program, sluggish and largely unsuccessful. Therefore, there are many organization that need to struggle to accomplish a crucial alignment. Aligning security programs with an enterprise needs a sturdy understanding of the technical area like how the diverse computing technologies are positioned across the enterprise and their business significance, in addition, as to how the specific protection supports precise business strategy objectives. Accordingly, it has a new approach to security governance which can make the transformation from information security risk function to a business aligned competence and help to see how security is viewed and subsidized within the enterprise. The effort to enhance focus on a business aligned approach will uplift security from a purely mitigation action to a tactical business enabler for the enterprise.

Project Background
The nature of business information technology is at a crossroads. The pressure to enforce good corporate governance, secure sensitive information and meet compliance mandates would seem to demand ever-tighter controls. On the other hand, the need to respond to new business opportunities, to collaborate with a greater number of partners more closely, and the emergence of new technologies are placing unprecedented strain on existing security processes and practices. But main highlighting factor is to elevate security from a purely risk mitigation activity to a strategic business enabler for enterprise management system. The aim of the business aligned security approach is to shape a security strategy that supports and enhances the operational efficiencies of business. There is no single tactic or strategy that guarantees success in improving business alignment of security. It is mandatory to understand the business needs and leverage the security program to increase operational efficiency, safeguard users and information, make the most of return on technology investment and contain costs. Business aligned security helps to protect business from relevant threats and reduce risk, and demonstrate a proactive posture to safeguard critical assets and elevate security from a tactical function to a strategic business enabler.

The enterprise system aligned secure business strategy may improve internal process efficiencies, raise service quality of enterprise management system and reduce enterprise operational risk threats. The business aligned security approach assists risk tolerance in the main crucial part of the enterprise system for instance business operations, reputations, information security and legal and regulatory risk. To successfully execute the business strategy, information security plays a key role in ensuring that strategic capabilities are securely planned, developed, and implemented. Strategic capabilities can include an enhanced collaboration capability, a virtual global office capability, or a cloud computing capability.

Project Objective
This paper aims to understand why information security must be aligned with business strategy. Besides, this study is to illustrate information security as a platform for protecting information availability, integrity and privacy. So, it is crucial to study the elementary process and to identify the business aligned security strategy and technology used.

Information Security Aligned To Enterprise Management


• The necessary of information security aligned with business strategy

Business Aligned Security to enterprise is using strategic activity to implement business strategy and capabilities in a secure manner. It is interesting to note that, most of the organization uses a risk centric approach to drive security activities and investment. Mostly, the risk could be occur through vulnerabilities, threat and related risks. Absolutely, The Business Aligned Security strategy produces improved outcomes compared to a risk-centric by using an approach. Cultivating the current set of mitigating controls that a risk-centric method entails, focuses on an important purpose but it is an operational activity. The importance of the information technology is as a significant business function to achieve benefits to the business prospects and enable improvement of company performance to reduce costs, standardize processes, boost productivity, improve risk control mechanism, implement new business strategies and gain competitive advantage by exploiting new technology.

• Information security management approach

The best practice approach to utilize can have a major impact on how security is perceived by technology users. The advancement technology to protect t security from vulnerabilities, threats and related risk is using technology well to guide and manage IT services such as ITIL v3 and depends on how security controls are technically integrated with IT services. To do this, the growth of information technology is provides several critical conduits as business information is not to be compromised and business managers expect the IT department to achieve the new vulnerabilities created. However, there is a boundary to what protection the IT department can offer without the entire business approach -the best firewall in the world will not stop employees from sending critical data out of the organization. Therefore, the role of ISM (Information Security Management) is taking into consideration the support and management of business activities. For example, business analysis gives maintenance the information security risk analysis. A sound knowledge of the enterprise is essential to support the customization of the greatest exercise guidance in a suitable and effective execution that will 'take' in that particular environment, culture, business and organizational structure. Information Security Managers need to be conscious of the lifecycle of organizational information assets and future plans


Figure 1: Achieving effective Information Security Management through the four Ps
(Clinch, 2009)


and business risk needs to be measured in order to certify the risks are evaluated and properly mitigated for every stage of the lifecycle. The more successfully it is done, the more likely the ISM function will be accepted as lawful for delivering value to the enterprise. In addition, the ISM policy and ISMS (Information Security Management System) should be developed to ensure the data is protected for all stages. A useful perspective of ITIL' four Ps of service design is shown to explain that the internal security risk may come readily to mind and it is likely to underestimate the security risk arising from organizational or personal information held, used or conveyed by partners. Conversely, the partners only as an entity in the value network, such as customers, as well as information accessed by partners on the organization on IT system must be safeguarded.

To reach a clear and effective set of ISM practices, an organization should follow these steps:

- Create, maintain, distribute and implement an Information Security Policy, supported by specific policies
- Recognize the business security policy and plans
- Understand current and future business security requirements
- Implement security controls that support the Information Security Policy and manage risks associated with access to services, information and systems
- Document all security controls and their operation, maintenance and associated risks
- Manage suppliers and contracts in respects of access to systems and services, in conjunction with the supplier management function
- Manage all security breaches and occurrences
- Proactively improve security controls and security risk management
- Ensure security aspects are integrated into all other ITSM processes.

In order to improve the plan element, good service level in planned, better organization of the responsibilities, well evaluated and implemented. There is framework which provides five elements to ensure the creation of an effective ISM following the Plan-Do-Check- Act cycle. In this case, ITIL describes a cycle with the following steps: Control, P. The framework is shown below;


(Clinch, ITIL V3 and Information Security, 2009)

• Manage suppliers and contracts in respects of access to systems and services, in conjunction with the supplier management function

- Manage all security breaches and occurrences
- Proactively improve security controls and security risk management
- Ensure security aspects are integrated into all other ITSM processes.

• The alignment process

Recognize the type of business: classify the whole document for the business process either formally or informally to realize the both formal and informal and preferred outcome from several factors such as capturing, processing, storing and distributing information or data.
Acknowledge the culture: evaluate the structure, attitude and nature of the organization.
Identify the IT state: recognize all the IT assets, application and distribution channel, with a realistic understanding of the nature and culture in the organization.
Realize the value chain: find and document the relationship or related points between the business and IT estate.
Understand the context: Gather and collate intelligence about essential factors internal and external.

• Define the change agenda: examine the context, the business strategy and powerful factors, recognize impact and application for the IT estate.

Chart the technology road map: priorities, time line, and optimize the change agenda.
- Plan the work program: translate the technology roadmap into business unit plans.
- Populate the distribution framework: the overall program of work for sending information technology to support business operation.
- Accomplish the business advantages: implement the delivery framework.

• Advantages of a Business Aligned Security Strategy

o Security strategy remarkably aligned with the business strategy
o Adjoining alignment between funded corporate initiatives and security initiatives
o Forward-looking security strategy
o Fewer point solutions / more strategic security initiatives
o Good explanation for finance security initiatives
o The view of security is raised to being a strategic enabler

The crucial impact of aligning security and enterprise are essential to achieve success for organizations that employ technology. In addition, the company also should understand the nature of several challenges to address such as it must understand the current business operation like organizational culture, Knowledge of the IT estate resources as well as the value chain, Good awareness of future business context and influential factors and a clear vision as yo where the organization is going and how to achieve the target and business goals.

Literature Review
Information technology is a platform or method for supporting the organization in achieving its goals and objectives. However, the technology project may face potential failure to achieve its requirements or goals to influence the risk of business failure against threats. Thus, the implementation of business information security in enterprise management is an ideal method for operation success. "The main goal of information security (IS) is to secure the business against threats and ensure success in daily operations, and aid the businesses in reaching the desired level of reliability and productivity through ensuring integrity, availability and confidentiality". This means to keep information secure; information security is a platform for protecting information availability, integrity, and privacy. The article of "Business Aligned Security" by Don Elledge and Roin Nance (2009), discusses how information security works within the enterprise. They figure out the strategy of Business Aligned Security and risk-based strategies are not mutually exclusive. In managing overall risk profile, an organization has to continue in handling it but it is not confronting current business opportunities. In contrast, the security organization plays an important role to communicate the security value of business and its impact. To simplify, implement Business Aligned Security approach is interrelating the way an organization perform its business activities with information security.

According to "An Executive Field Manual" by Michael Fey, Brian Kenyon, Kevin Reardon, Bradon Rogers and Charles Ross (2012) to explain the strategic plan refers to required action that should be taken, and the impact and the process towards implementing the action. To simplify, it is an instrument for measuring and managing the direction to be in alignment towards the defined plan. To expound the Business Model for Information Security began life as a model for systemic security management. The model was created by Dr. Laree Kiely and Terry Benzel at the USC Marshall School of Business Institute for Critical Information Infrastructure Protection. There are four elements of the model. The first is Organization Design and Strategy. An organization refers to the interaction between an intercommunication of people, assets and processes to define roles and undertake a common goal. The goals to be accomplished are specified by the enterprise's strategy. Each part of the strategy is defined by the people as the second element of the model to implement it. Next to get things done, both formal and informal mechanisms process is included and provides a vital link to all of the dynamic interconnections. In implementing the operational part of the organization element, the strategy derives progressions to recognize, measure, manage and control risk, availability, integrity and confidentiality as well as to ensure accountability. To make processes more effective, the technology element is composed of all of the tools, applications and infrastructure. Technology has its own dynamic risks as it experiences frequent changes. Given the typical enterprise's dependence on technology, technology constitutes a core part of the enterprise's infrastructure and a critical component in accomplishing its mission.

The article "Managing for Enterprise Security" by Richard A. Caralli (2004) discusses misaligning business information security in an enterprise with strategic drivers bringing undesirable organization elasticity. This is a fundamental fact that having large resources not aimed at affording the organization's strategic drivers may not recover the organization's resiliency. The authors have come up with evidence their field work has witnessed continuous failure of organizations to report improvements in grasping or understanding clearly the security goals even as the organizations acquire and execute advance security technologies. For example, a new firewall device is introduced but still results in increase in risk assessment activity in organizations. The assessment of organizational risk as believed by many organizations, should be performed by IT personnel considering their responsibility for security. However, the authors express their disappointment on the observation with the CERT® Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE®) method as they found out that the IT personnel who are among students participating in the OCTAVE training were unable to give final decisions on security requirement of their organizations' important assets unlike the owner of the asset which is the business personnel.

Conclusion
The advancement of technology plays an effective role in enterprises to maintain profitable, as information security has become more of a business enabler than ever thought possible. The main goal of information security (IS) is to secure the business against threats and aid the businesses in reaching the desired level of reliability and productivity through ensuring integrity, availability and confidentiality. The business needs approaches have been identified as a holistic approach which examines the system as a complete functioning unit and the other approaches are to examine the whole organization. The specification of security requirement is to recognize organizations' requirement with respect to security. The effectiveness of business information security should be aligned with business strategy through a well defined element process. The strategy requires the process element to identify, measure, manage and handle risk, availability, integrity and privacy as well as to ensure accountability. Next, the technology element is composed of all the tools ,applications and infrastructure for process efficiency.

References
1. Project Management Institute, A Guide to the Project Management Body of Knowledge, (PMBOK Guide), Fourth Edition, ANSI/PMI 99-001-2008, pp. 273-312.
2. Clinch, J. (2009, May). ITIL V3 and Information Security.9.
3. Clinch, J. (2009, May). ITIL V3 and Information Security. 10.
4. Garvey, P.R., 2008, Analytical Methods for Risk Management: A Systems Engineering Perspective, Chapman-Hall/CRC-Press, Taylor & Francis Group (UK), Boca Raton, London, New York, ISBN: 1584886374
5. Gustavo Alberto de Oliveira Alves, "Information Security, An original vision of Management", Ed. Ciência Moderna, 2005 (in portuguese).
6. Basie von Solms, "Information Security Governance e Compliance management vs operational Management", Computers & Security, 24, Elsevier, pp. 443-447, 2005.
7. Bharadwaj, A. S. (2000). A resource-based perspective on information technology capability and firm performance. An empirical investigation. . MIS Quarterly, 24(1), 169-196.
8. Scholtz, T. (2013). Seven ways to align security with the business. How can security play a central role in enabling business growth?
9. Bordoloi, C. (2012, 12 19). How to Align Security with Strategic Business Objectives. Retrieved October 30, 2014,
http://www.enterprisecioforum.com/en/blogs/cj-bordoloi/how-align-security-strategic-business-ob
10. Kent Anderson, C. (2014). A Business Model for Information Security. ISACA. Retrieved 12 01, 2014, from http://www.isaca.org/Journal/Past-Issues/2008/Volume-3/Pages/A-Business-Model-for-Information-Security1.aspx
11. Driving Alignment between business and security.(2014). Retrieved November 11, 2014, from http://www.edgile.com/what_we_do/strategy_and_governance.html