Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa

Information security in the form of IT governance is part of corporate governance. Corporate governance requires that structures and processes are in place with appropriate checks and balances to enable directors to discharge their responsibilities. Accordingly, information security must be treat...

Full description

Bibliographic Details
Main Author: Basani, Mandla
Other Authors: Loock, Marianne
Format: Others
Language:en
Published: 2013
Subjects:
Online Access:http://hdl.handle.net/10500/9300
id ndltd-netd.ac.za-oai-union.ndltd.org-unisa-oai-umkn-dsp01.int.unisa.ac.za-10500-9300
record_format oai_dc
spelling ndltd-netd.ac.za-oai-union.ndltd.org-unisa-oai-umkn-dsp01.int.unisa.ac.za-10500-93002016-04-16T04:08:19Z Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa Basani, Mandla Loock, Marianne Information security professionals, ICT security auditors, Regulatory officials Framework Role players Information security programme Corporate governance IT governance COBIT 005.80968 Information technology -- Security measures -- South Africa -- Management Information security in the form of IT governance is part of corporate governance. Corporate governance requires that structures and processes are in place with appropriate checks and balances to enable directors to discharge their responsibilities. Accordingly, information security must be treated in the same way as all the other components of corporate governance. This includes making information security a core part of executive and board responsibilities. Critically, corporate governance requires proper checks and balances to be established in an organisation; consequently, these must be in place for all information security implementations. In order to achieve this, it is important to have the involvement of three key role players, namely information security professionals, ICT security auditors and regulatory officials (from now on these will be referred to collectively as the ‘role players’). These three role players must ensure that any information security controls implemented are properly checked and evaluated against the organisation’s strategic objectives and regulatory requirements. While maintaining their individual independence, the three role players must work together to achieve their individual goals with a view to, as a collective, contributing positively to the overall information security of an organisation. Working together requires that each role player must clearly understand its individual role, as well the role of the other players at different points in an information security programme. In a nutshell, the role players must be aligned such that their involvement will deliver maximum value to the organisation. This alignment must be based on a common framework which is understood and accepted by all three role players. This study proposes a South African Information Security Alignment (SAISA) framework to ensure the alignment of the role players in the implementation and evaluation of information security controls. The structure of the SAISA framework is based on that of the COBIT 4.1 (Control Objectives for Information and Related Technology). Hence, the SAISA framework comprises four domains, namely, Plan and Organise Information Security (PO-IS), Acquire and Implement Information Security (AI-IS), Deliver and Support Information Security (DS-IS) and Monitor and Evaluate Information Security (ME-IS). The SAISA framework brings together the three role players with a view to assisting them to understand their respective roles, as well as those of the other role players, as they implement and evaluate information security controls. The framework is intended to improve cooperation among the role players by ensuring that they view each other as partners in this process. Through the life cycle structure it adopts, the SAISA framework provides an effective and efficient tool for rolling out an information security programme in an organisation Computer Science M. Sc. (Computer Science) 2013-04-30T06:09:55Z 2013-04-30T06:09:55Z 2012-02 Dissertation http://hdl.handle.net/10500/9300 en University of South Africa 1 online resource (157 p. :|bill.)
collection NDLTD
language en
format Others
sources NDLTD
topic Information security professionals,
ICT security auditors,
Regulatory officials
Framework
Role players
Information security programme
Corporate governance
IT governance
COBIT
005.80968
Information technology -- Security measures -- South Africa -- Management
spellingShingle Information security professionals,
ICT security auditors,
Regulatory officials
Framework
Role players
Information security programme
Corporate governance
IT governance
COBIT
005.80968
Information technology -- Security measures -- South Africa -- Management
Basani, Mandla
Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa
description Information security in the form of IT governance is part of corporate governance. Corporate governance requires that structures and processes are in place with appropriate checks and balances to enable directors to discharge their responsibilities. Accordingly, information security must be treated in the same way as all the other components of corporate governance. This includes making information security a core part of executive and board responsibilities. Critically, corporate governance requires proper checks and balances to be established in an organisation; consequently, these must be in place for all information security implementations. In order to achieve this, it is important to have the involvement of three key role players, namely information security professionals, ICT security auditors and regulatory officials (from now on these will be referred to collectively as the ‘role players’). These three role players must ensure that any information security controls implemented are properly checked and evaluated against the organisation’s strategic objectives and regulatory requirements. While maintaining their individual independence, the three role players must work together to achieve their individual goals with a view to, as a collective, contributing positively to the overall information security of an organisation. Working together requires that each role player must clearly understand its individual role, as well the role of the other players at different points in an information security programme. In a nutshell, the role players must be aligned such that their involvement will deliver maximum value to the organisation. This alignment must be based on a common framework which is understood and accepted by all three role players. This study proposes a South African Information Security Alignment (SAISA) framework to ensure the alignment of the role players in the implementation and evaluation of information security controls. The structure of the SAISA framework is based on that of the COBIT 4.1 (Control Objectives for Information and Related Technology). Hence, the SAISA framework comprises four domains, namely, Plan and Organise Information Security (PO-IS), Acquire and Implement Information Security (AI-IS), Deliver and Support Information Security (DS-IS) and Monitor and Evaluate Information Security (ME-IS). The SAISA framework brings together the three role players with a view to assisting them to understand their respective roles, as well as those of the other role players, as they implement and evaluate information security controls. The framework is intended to improve cooperation among the role players by ensuring that they view each other as partners in this process. Through the life cycle structure it adopts, the SAISA framework provides an effective and efficient tool for rolling out an information security programme in an organisation === Computer Science === M. Sc. (Computer Science)
author2 Loock, Marianne
author_facet Loock, Marianne
Basani, Mandla
author Basani, Mandla
author_sort Basani, Mandla
title Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa
title_short Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa
title_full Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa
title_fullStr Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa
title_full_unstemmed Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa
title_sort towards a framework to ensure alignment among information security professionals, ict security auditors and regulatory officials in implementing information security in south africa
publishDate 2013
url http://hdl.handle.net/10500/9300
work_keys_str_mv AT basanimandla towardsaframeworktoensurealignmentamonginformationsecurityprofessionalsictsecurityauditorsandregulatoryofficialsinimplementinginformationsecurityinsouthafrica
_version_ 1718224684327108608