Page 163 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 163

Unit 11: Security Models & Frameworks and Methodologies for Information System Security




          framework has been generally produced and adopted by the Big N audit houses as a solution to  Notes
          most IT audit, compliance, and control “problems.”
          The  framework offers maturity models, critical success  factors,  main  goal indicators, and
          performance indicators, all  for use in  organizing Information  and associated Technology.
          Additionally, COBIT defines control aims and audit guidelines to hold up its implementation.
          These practice statements go into adequate detail to teach an IT or audit practitioner in how to
          best execute the framework.

          At the core of COBIT is a repeated procedure that circles about “Information” and “IT Resources.”
          The four stages (or domains, as COBIT calls them) of the cycle are “Planning & Organization,”
          “Acquisition & Implementation,” “Delivery & Support,” and “Monitoring.” The cycle begins
          with “Information” that has ties to COBIT and “IT Resources,” and then directs to P&O, which
          leads to A&I, which leads to D&S, which leads to Monitoring. Each of the four domains defines
          detailed, particular practices for execution.
          COBIT is best defined by this process-flow statement “The control of IT Processes which convince
          Business Requirements is enabled by Control Statements allowing for Control Practices.”
          At its finest, COBIT is a very methodical framework for defining, implementing, and reviewing
          IT controls. For audit organizations, either internal or external, those are hoping to get their
          hands around the often times demanding task of assuring that effective controls are in position
          on key systems (“monetarily significant” in the SOX vocabulary), then COBIT is precisely what
          the doctor ordered.
          Unfortunately, COBIT can be a very confusing framework for information security practitioners.

          For beginners, COBIT is not an information safety framework. It is an IT controls framework, of
          which infosec  displays one  (1) practice out of 34. Moreover,  to execute  COBIT  inside an
          organization means dedicating an extraordinarily significant amount of resources to the task. In
          this day and age of decreasing functional budgets and increasing threats and narrow burden, it
          is not sensible to suppose that an organization can readily execute all of COBIT.
          Furthermore, there is no understandable security advantage  for an  organization to execute
          COBIT. Information security, being a holistic difficulty that must be addressed at all levels of an
          organization, is not IT specific.
          As such, any on the whole framework executed to improve the information security posture of
          an organization requires to speak to those different levels, and not be bound painfully to one
          focus (IT). If one were to listen to the leadership of public accounting firms, one might think that
          COBIT was the best solution for solving security difficulties.
          What one would want to bear in mind, however, is that COBIT was produced by the Big N audit
          firms, for the Big N audit firms. Deployment of COBIT across an organization offers the added
          advantage to the audit firms of being able to decrease  total hours spent on an yearly  audit,
          therefore reducing the investment in personnel necessary, optimizing the productivity of the
          engagement. Whether or not the association being audited will see any price savings  from
          executing COBIT is debatable. And, in the end, the association will not have addressed information
          security, but as an alternative addressed the audit ability of its IT resources.
          COBIT (Control Objectives for Information and Related Technology) is an global open standard
          that defines needs for the control and safety of sensitive data and offers a reference framework.
          COBIT, which offers a reference framework, was produced in the 1990s by the IT Governance
          Institute.








                                           LOVELY PROFESSIONAL UNIVERSITY                                   157
   158   159   160   161   162   163   164   165   166   167   168