Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers)
|
|
|
- Shanon Rose
- 10 years ago
- Views:
Transcription
1 Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) June 2011 DISCLAIMER: This document is intended as a general guide only. To the extent permitted by law, the Australian Government makes no representations or warranties of any kind, express or implied, about the accuracy or completeness of the material contained in the document. The reliability of any assessment or evaluation based on its content are matters for the independent judgement of users. Users should seek professional advice as to their specific risks and needs. The Australian Government accepts no responsibility for the consequences of any use of this document.
2 This Page is Intentionally Blank 2
3 1. Executive Summary Definitions... 7 Outsourcing... 7 Information Security... 8 Cloud Computing Information Security Management Elements and Potential Issues for an Outsourcing Arrangement.. 11 Information Security Governance Roles and Responsibilities Risk Management and Assessment Change Management Assurance and Conformance Managing Information Security during the Outsourcing Process Incident Management Termination and Transition Conclusion Appendices Appendix A Example Organisational and Service Provider Roles and Responsibilities Appendix B Assurance Tools and Mechanisms Appendix C Outsourcing Termination and Transition Arrangement Organisational and Service Provider Contractual Obligations Appendix D Indicative Change Management Initiation and Cost Responsibilities Appendix E Contract Lifecycle and Security Activities Appendix F Useful Resources and Reference Material
4 Foreword Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) (The Guide) provides Australian critical infrastructure providers with a resource to assist with the potential information security issues when considering the outsourcing of services or assessing the IT arrangements contained in existing outsourcing contracts. The Department of Broadband, Communications and the Digital Economy (DBCDE) on behalf of the IT Security Expert Advisory Group (ITSEAG) of the Trusted Information Sharing Network (TISN) has prepared this guide. This guide builds upon the previous guide, published by DBCDE in 2007, relevant standards and guidance as well as referencing information contained within the Centre for the Protection of National Infrastructure s (UK) document entitled, Outsourcing: Security Governance Framework for IT Managed Service Provision (Version 2, 2009) 1. In preparing this updated version of the Guide in 2011, a range of drafting principles were used to inform its structure and content. These principles included: Broadening the intended audience of the guide to a wider CXO community rather than focussing solely on the CIO; Including a consideration of specific information security issues that may be faced with the use of cloud computing; Ensuring the language in the Guide is non-technical in its nature; Complementing established information security standards and frameworks; and Avoiding the provision of legal advice specific to a particular organisation s IT outsourcing arrangements. DBCDE would like to thank the UK Government for allowing the Australian Government to reference their published guidance on this resource. DBCDE would also like to acknowledge the active involvement of the ITSEAG members throughout the preparation of the Guide. A supplementary Executive Overview of this document is also available on the TISN website for download. 2. ITSEAG Secretariat Communications Critical Infrastructure Resilience Department of Broadband, Communications and the Digital Economy [email protected] Web: and 1 Available at 2 Available at 4
5 1. Executive Summary Risk comes from not knowing what you are doing....warren Buffet Outsourcing of IT services can provide an organisation the opportunity to realise valuable strategic and economic benefits. However, for critical infrastructure providers, prior to the commencement of any outsourcing arrangement, the careful consideration of risks and threats, the structure of contractual arrangements, and compliance obligations must take place. For a critical infrastructure provider, the design and implementation of sound information security principles and practices should be of paramount importance and integrated throughout each and every business process. The failure to adequately consider the range of information security risks and threats that could compromise the integrity, availability and performance of the services provided through an outsourcing arrangement may result in: The lack of compliance to legislative obligations, carried at both the corporate and executive levels of the organisation, resulting in exposures to potential litigation; The inability to provide critical services to the community leading to potential national security exposures; and Costly remediation activities to rectify the service provision in the event of an information security incident. Services may be outsourced but risks and regulatory compliance remain the responsibility of the Critical Service Provider Further to these potential exposures, it is important for critical infrastructure providers to understand that whilst the establishment of an outsourcing arrangement may transfer the delivery of a business function to a third party - the ultimate responsibility for the design and implementation of information security policies, regulatory compliance, and control execution remains with the critical infrastructure provider. This guide covers a wide range of potential information security issues that a critical infrastructure provider should consider in an outsourcing environment. The Guide is intended to provoke dialogue within an organisation s executive to firstly assess whether a service could be suitable for outsourcing, and if so, what are the first principles relating to information security that should be considered. 5
6 The structure of the Guide covers eight (8) information security management elements that occur throughout the outsourcing lifecycle, namely: Information security governance; Roles and Responsibilities; Risk Management and Assessment; Change Management; Assurance and Conformance; Managing information security throughout the outsourcing arrangement; Incident Management; and Termination and Transition. Outsourcing services to a cloudbased provider doesn t change the security principles; it just changes the complexity of maintaining effective information security. The Guide also briefly discusses cloud computing (the cloud) as a particular outsourcing variant, providing some insights into the differences from traditional outsourcing arrangements and some of the specific information security exposures that should be considered by a critical infrastructure provider, including: Compliance with jurisdictional legislation beyond that of Australian Federal, State and Territory Governments; Managing the confidentiality of information in an environment that may provide services to a large number of different customers; Gaining assurance over the effectiveness of information security controls in the cloud; and Ensuring the security posture of the cloud provider is aligned to the Critical Service Provider. Whilst this guide is not intended to be a comprehensive how-to manual, for the design and implementation of information security within an outsourcing environment, a number of useful tools and references have been included in the appendices that may provide further insights for an executive team, wishing to gain a deeper understanding of this important topic. 6
7 2. Definitions Outsourcing An organisation s chosen ICT sourcing mechanism determines how an organisation s ICT components are obtained, managed and operated. The basic objective of ICT sourcing functions is to deliver the best level of support for the organisation s business requirements in the most cost-effective way. 3 Drivers for ICT sourcing may include cost savings, increased business flexibility, exploitation of new technologies and accessing specialist expertise as well as government directives. Outsourcing as a sourcing option, refers to an arrangement by which a task (s) that would otherwise be performed by staff internal to the organisation is transferred to an external entity specialising in the management and delivery of the task (s). As a result, outsourcing involves transferring or sharing management control of a business function, enabled by two-way information exchange, coordination, and trust between the outsourcer and the client. 4 It is important to understand that responsibilities and controls must remain in place for services, whether internally managed or outsourced, particularly with regards to IT security. Figure 1: Internal versus outsourced service responsibilities As Figure 1 shows, under an outsourcing arrangement, whilst the delivery of the service has been moved to a service provider from outside the organisation, the design, implementation and deployment of internal policies, regulatory elements, responsibilities and controls need to be mirrored across both organisations. If this consistency is not maintained across both organisations, the likelihood of the arrangements succeeding will be diminished as well as creating additional 3 A Guide to ICT Sourcing for Australian Government Agencies, Department of Finance and Deregulation, Sept 2007, p 2 4 Secure Your Information Information Security Principles for Enterprise Architecture: Report, TISN, Sept 2007, p 52
8 management overheads when trying to maintain effective information security controls. As with all outsourcing arrangements, the nature of the information being managed by the third party provider should be carefully considered prior to embarking on an outsourcing arrangement. If the information under management is deemed to be of a sensitive nature, an organisation should strongly assess the suitability of outsourcing as a provision mechanism. Information Security Information security is the protection of information and information systems and encompasses all infrastructure that includes processes, systems, services, and technology. It relates to the security of any information that is stored, processed or transmitted in electronic or similar form. IT security is a subset of information security and is concerned with the security of electronic systems, including computer, voice, and data networks 5. Information security has the following objectives: Confidentiality Ensuring that information is accessible only to those with a legitimate requirement and authorised for such access; Integrity - Safeguarding the accuracy and completeness of information and processing methods; and Availability - Ensuring that authorised users have access to information and associated assets when required. 6 Underpinning these objectives is a set of information security principles, outlined in the ITSEAG paper Secure your Information: Information Security Principles for Enterprise Architecture 7, as follows: 1. Information Security is Integral to Enterprise Security; 2. Information Security Impacts on the Entire Organisation; 3. Enterprise Risk Management defines Information Security Requirements; 4. Information Security Accountabilities should be Defined ad Acknowledged; 5. Information Security must consider Internal and External Stakeholders; 6. Information Security requires Understanding and Commitment; and 7. Information Security requires Continual Improvement. 5 IT Security Management Audit Report No. 23, Australian National Audit Office, Dec 2005, p 21 6 Protective Security Policy Framework, Australian Government Attorney-General s Department, Jan 2011, p 24 7 Secure your Information: Information Security Principles for Enterprise Architecture, Department of Broadband, Communications and the Digital Economy, Information Technology Security Expert Advisory Group, June 2007, Executive Summary 8
9 Cloud Computing The Australian Government definition of Cloud Computing is based on the US Government s National Institute of Standards and Technology (NIST) definition as an ICT sourcing and delivery model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud Computing as a business model for service provision is becoming more prevalent, driven by the potential for cost and time efficiencies. Cloud computing delivery models can be summarised as: Infrastructure as a Service (IaaS), which involves the vendor providing physical computer hardware including processing, memory, data storage and network connectivity; Platform as a Service (PaaS), which includes the vendor provisioning IaaS as well as operating systems and server applications; and Software as a Service (SaaS) which includes the vendor providing cloud hosted software applications. Cloud computing is also categorised by a range of different deployment models that include: The public cloud, which is shared by multiple organisations and accessed through the public internet; The private cloud, where an organisation utilises a cloud that is provisioned by the vendor for its sole use and accessed through a private connectivity mechanism; A community cloud, which is generally used by like type organisations with a similar security and risk profile; and The hybrid cloud, which involves a combination of the other three deployment models. Table 1: Key cloud computing characteristics and enablers Cloud computing characteristics Cloud computing enablers On-demand self-service Reliable, high-speed networks Broad network access Large, global-class infrastructures Resource pooling Virtualisation capabilities Rapid elasticity Commodity server hardware Measured service Open-source software Adoption of Web 2.0 standards 9
10 Integral to cloud computing is the concept of leveraged infrastructure and the sharing of resources, allowing the delivery of services at a lower cost. However, pushing the business applications and corporate data beyond the perimeter of the corporate environment (and in many cases beyond geographic boundaries) can result in higher levels of complexity and risk when attempting to effectively manage security. Whilst the trend for organisations to embrace and leverage new technologies and delivery platforms (including cloud computing) for their services is unlikely to slow down in the future, the importance ascribed by an organisation to effectively manage security needs to keep pace with this adoption. The use of emerging technologies by organisations may have an adverse effect on an organisation s security profile, increasing the risk complexity and threat landscape for an organisation. 8 When this changing landscape is coupled with the outsourcing of services to third-party providers, the complexity of managing security can be magnified, resulting in offsets to the savings driven by outsourcing through a requirement for higher security management costs. Throughout this guide s discussion of the information security management elements related to outsourcing, specific reference will be made to cloud computing in order to highlight any differences to a traditional outsourcing arrangement that a Critical Infrastructure Provider may need to consider. 8 Achieving IT Resilience Advice for CIOs and CSOs, Trusted Information Sharing Network, May 2010, p 3 10
11 3. Information Security Management Elements and Potential Issues for an Outsourcing Arrangement This section provides an overview of each of eight information security management elements within the context of an organisation considering the initiation and management of an outsourcing arrangement. In order to promote a truly effective information security management approach, each of these elements requires the same priority and focus from an organisation. Figure 2 Information security elements Information Security Governance It is important for management to understand their role in planning, implementing and maintaining effective information security governance in organisations. Information security governance defines the security principles, accountabilities, and actions required by an organisation to achieve their identified security objectives. Underpinning effective information security governance is the governance of an organisation s Information Technology (IT) systems. IT systems are a core component of an organisation s operations and therefore the implementation of sound governance practices across these systems forms a key component of an organisation s corporate governance. 9 9 CIO, CISO and Practitioner Guidance, IT Security Governance, Department of Broadband, Communications and the Digital Economy, Revision 2 December 2009, provides further information and guidance relating to IT Security Governance 11
12 Information security governance should align to all other governing areas within an organisation, forming part of the overall corporate governance of an organisation. Figure 3: Corporate, IT, Information and security governance relationships Corporate Governance IT Governance Information Security Governance Security Governance In an outsourcing arrangement, information security must be comprehensively addressed at all stages, including prior to the arrangement being established, throughout the operation of the arrangement and during termination or transition. An incident caused by human error, systems failure, or malicious code/activity that compromises the integrity, availability or confidentiality of a critical infrastructure provider s information may result in negating any net benefits derived from an outsourcing arrangement. The consequences of such an incident may also result in widespread flow-on effects that may impact national security, the economy and, potentially, loss of life. In conjunction with the establishment of sound information security governance principles in an outsourcing arrangement, it is also important for organisations to consider issues relating to Identity, Entitlement and Access (IdEA) management for both the end consumer and the service providers involved in the delivery of the outsourced service. 10 Although an organisation may have sound internal information security governance systems in place, it is possible that these systems may not have been designed for an outsourcing arrangement where the roles and responsibilities are shared between the organisation and an external service provider. 10 Further information on IdEA can be found within the Jericho Forum Commandments, 12
13 Both the organisation and outsourcing provider s information security governance policies should be consistent and complimentary, ensuring the effective mitigation of both the risks and threats that may impact the delivery of the service covered by the outsourcing arrangement. The principles that determine information security governance under a cloud computing outsourcing arrangement are no different to a traditional outsourcing arrangement; however, the complexity of achieving effective information security governance may be magnified due to: The potential for data or business functionality to be replicated with additional vendors, other than the prime outsourcing provider; Compliance with jurisdictional legislation, if the cloud service operates beyond domestic boundaries; The hosting of data or business functionality on infrastructure shared by other organisations (potentially with different confidentiality, availability and integrity requirements); Lack of transparency across the platform hosting the data and business functionality; and The provider s security posture differing from the critical infrastructure provider. 13
14 Roles and Responsibilities In any outsourcing arrangement, the establishment of clear roles and responsibilities between an organisation s management and the outsourcing provider is essential. Underpinning the establishment of clear roles and responsibilities is the drafting and execution of clearly articulated contractual arrangements for the provision of the service. Critical Infrastructure Providers should also be cognisant of the fact that many outsourced arrangements may rely on the use of sub-contractors for the delivery of components within the service-in-view. Where this is the case, contractual arrangements should ensure the prime outsourcing provider remains accountable and responsible for all actions undertaken by sub-contractors, and are responsible for managing information security governance across all sub-contractors, providing assurance to the organisation. Further information relating to the definition of roles and responsibilities between an organisation and an outsourcing provider can be found in Appendix A. Under a cloud based outsourcing arrangement, the establishment of clear roles and responsibilities may become more difficult for an organisation due to the potential for a greater number of cascading service providers to be involved in the provision of the service. However, regardless of the potential for greater complexity, the requirement to define clearly articulated roles and responsibilities is the same as within traditional outsourcing arrangements. 14
15 Risk Management and Assessment Effective risk management processes and detailed risk assessments are pivotal to the success of an outsourcing arrangement. Information security risk can be closely tied to other business risks, such as reputational or financial and as such, the importance of gaining a clear understanding of the relationship between information security risk and an organisation s overall corporate risk assessment cannot be understated. Figure 4: Risk management process Communication and consultation Establish the context Risk identification Risk analysis Risk evaluation Risk treatment Monitoring and review a) Communication and consultation: Underpins the entire information security risk management process, addressing issues related to the risk, ensuring that stakeholders are informed on the basis of decisions made relating to the risks. b) establish the context: Articulation of the objectives to be taken into account when managing the risks, including setting the scope and risk criteria for the process. c) Risk identification: Identification of the sources of IT security risks, areas of impact, events, and causes, and their potential consequences. Identification of risks should include those risks which are not under the control of the organisation. d) Risk analysis: Includes an evaluation and decision of whether an identified risk must be addressed. Includes determination of likelihood, consequences, and the mitigation strategies required to effectively treat the risks. e) Risk evaluation: Determine whether to address risks based on the outcome of the risk analysis process, the risk criteria established, and the wider context of risk within the organisation. f) Risk treatment: Selection of options for treating risks, and the implementation of the options chosen to address the risks. g) Monitoring and Review: Regular determination of the effectiveness of controls implemented against risks, detection of changes in the context, risk criteria, scope and the identification of improvements to better address risks. Once an organisation has selected an appropriate risk management methodology, such as AS/NZS ISO/IEC 31000, a thorough assessment of information security risks should be undertaken prior to a decision to enter into an outsourcing arrangement. Forming part of this assessment should include a consideration by the organisation of the suitability of the data that will be managed throughout the arrangement. As an example, if the data has a security classification other than unclassified or, if the data is commercially important or critical in its nature, the outsourced provision of services 15
16 maybe unacceptable based on the potential risks of data loss or access by unauthorised individuals. A risk assessment is vital to ensure that the organisation understands its information security requirements, as well as ensuring outsourcing suppliers understand the risks they are expected and contracted to manage. Where a supplier utilises sub-contractors to perform some of the outsourced IT functions, the sub-contractors must be bound by the same risk management analysis as performed with the prime-provider. It is also important to note that an organisation s risk landscape is rarely static and is highly likely to change over time. As a result of the fluidity that may underpin risk management, an organisation should re-assess their risk and associated mitigation strategy on a regular basis in order to ensure the risk landscape is accurate and up to date. Once a risk assessment has been performed by an organisation and an appropriate outsourcing provider has been engaged, ensuring information security risks are effectively managed during the transition period requires the organisation and the outsourcing provider to jointly develop a security management transition plan, which should in turn, form part of the contract. The plan should have three phases: the transition of any applicable information security elements to the service provider a joint responsibility; the implementation of an Information Security Management System (ISMS) which aligns to the risk assessment, compliance requirements, control specification and other contractual requirements this is the service provider s responsibility; and a post-implementation assurance review in a form specified by the organisation, compatible with the security management approach this is the organisation's responsibility. Further detail relating to the design components within an ISMS can be found in the Managing Information Security during the Outsourcing Process section. Risk management and assessment processes for a cloud based outsourcing arrangement does not differ from traditional outsourcing arrangements but some of the additional threats posed by such an arrangement that may need to be assessed, include: The geographical location of information and business functions and the resultant legislative requirements that may be applicable; The privacy and integrity of the data within the cloud; The transparency over security controls, knowing the location of the servers, and the ability to audit them for compliance to policies; The availability of the cloud service and business continuity provisions; The enforceability of service level agreements in the case of a service degradation or outage; The ability for a critical infrastructure provider to relocate or transfer services from one service provider to another; 16
17 The outsourcing provider s security processes and policy alignment to the organisation s security posture; and the outsourcing provider s ability to segregate data and business functionality between customers. Change Management As was touched upon in the Risk Management and Assessment section, large and complex contracts may require changes over their course. These changes may relate to information security, either through changes in the scope, functionality or performance of the outsourced services, or because the security requirement itself has changed. A change management procedure should be contractually agreed between the organisation and the outsourcing provider for any changes to the service which may have a material effect on information security. One procedure that may be considered to effectively manage change is the establishment of a formal Change Management Board with representation by qualified and experienced information security professionals from both the organisation and the service provider. Processes should be contractually established for the ongoing management of the security relationship with the service provider, covering changes in: risk; security requirements (including control specifications); commissioning of, results of, and corrective actions from security performance and assurance reporting; and access control changes relating to security. Change management processes are no different from in a cloud based outsourcing arrangement from a traditional based outsourcing arrangement. However it should be noted that whilst one of the major benefits from cloud computing is the use of a homogenous environment that drives down the provision cost, achieving flexibility and customisation of an environment can be extremely difficult and sometimes costly. Importantly, under a traditional outsourcing arrangement, the outsourcing provider will generally take an organisation s existing business processes and deliver them as per the organisation s design. However, under a cloud based outsourcing arrangement the organisation generally has to re-engineer their business processes to suit the standard service provided by the cloud vendor. This may mean that if the cloud provider changes its business process, a significant impact on the organisation s business processes may occur. 17
18 Assurance and Conformance A key component of effective information security management in an outsourcing environment is the ability of an organisation to gain assurance that risks have been managed, are being managed, and will continue to be managed. As previously discussed in the Risk Management and Assessment section, outsourced arrangements often involve corporate risk in terms of overall business continuity, loss of reputation and/or regulatory non-compliance to the extent that organisations cannot wait for an incident to happen and then seek to claim damages for remediation. Appendix B depicts a table that describes a range of tools and mechanisms available to Critical Infrastructure Providers for the management of assurance and conformance. These tools and mechanisms include: Regular information security management scorecards and reporting; Outsourcing provider commissioned information security audits; Critical infrastructure provider commissioned information security reviews; Standards certification (e.g. SAS70 and AS/ ISO 27001); and Letters of assurance. Under a cloud based outsourcing arrangement, the ability to achieve adequate assurance over information security controls and processes can be difficult due to the nature of how the data and business functionality is provisioned by the service provider. Again, the principles relating to assurance and conformance do not change from traditional outsourcing arrangements and a Critical Infrastructure Provider should be satisfied that there are adequate tools and mechanisms available to achieve assurance prior to entering into a cloud based outsourcing arrangement. 18
19 Managing Information Security during the Outsourcing Process A Critical Infrastructure Provider will need to consider its in-house capability to effectively manage IT security throughout the duration of an outsourcing arrangement. If an organisation is not confident of its capability in this area, it may consider contracting this function to a qualified third party. This is important as an organisation s management has a responsibility to ensure that it has sufficient visibility over the security controls and that they are working effectively. This visibility relates not only to the outsourced service provider, but also with any subcontractors used by the service provider. Accordingly, prior to entering into an outsourcing arrangement, an appropriate organisational IT security strategy should be put in place and uniformly incorporated into each outsourcing contract ensuring consistency. This will assist the organisation to: enhance alignment between outsourcing contracts and the organisation-wide strategy; make administration more effective and efficient; increase the likelihood of overall compliance; and allow for the easier detection of systemic and organisational issues. S/NZS ISO/IEC 2700 x 11 provides a useful reference that specifies the requirements of an effective ISMS model. Accordingly, a critical infrastructure provider may consider using an ISMS model similar to Figure 5. Figure 5: ISMS model Define the scope and boundaries of the ISMS in terms of the business Define an ISMS policy Define the risk assessment approach of your organisation. Identify risks Analyse and evaluate risks Prepare a Statement of Applicability (see note below) Obtain management authorisation to implement and operate the ISMS Obtain management approval of the proposed residual risk Select objectives and controls for the treatment of risks Identify and evaluate options for the treatment of risks Note: A Statement of Applicability shows the controls that have been selected, or not selected from ISO and the reason for their selection, or non-selection. It must also show the controls as currently implemented. The information security management process illustrated in Figure 6 shows the development of the relationship between the organisation and the outsourcing
20 provider, describing the flow of information related to risk assessment, security requirements, reporting, security assurance, and right of audit. Figure 6 Flow of risk management information in an outsourcing arrangement Assessment of risk Assessment of risk Organisation Security requirements Security reporting Outsourcing Provider Security requirements Security reporting For each Sub-contractor Security assurance Security assurance Right of audit Right of audit In the case of an outsourcing arrangement, if the service provider subcontracts work related to the organisation s IT functions, they should repeat the outsourcing information security management process with each subcontractor, such that the ISMS covers all of the information and systems outsourced by the organisation. This should be specified within the initial outsourcing contract. Managing information security during a cloud based outsourcing arrangement remains the same as for traditional outsourcing arrangements, however an organisation may need to accept the policies and processes on offer from the cloud vendor. Should this be the case, the organisation should satisfy themselves that the acceptance of the vendor s processes will provide suitable oversight across the service throughout the arrangement. Incident Management The actions taken in response to an information security breach or incident may have significant impacts on an organisation. An outsourcing arrangement should contractually oblige the outsourcing provider to report to a nominated contact within the organisation on an agreed basis (and format) all security related: suspected or confirmed incidents (such as a detected abnormality in an operating environment); anomalies; contact by law enforcement, regulatory or security authorities; and civil injunctions or search orders. 20
21 Approaches to incident management are covered in detail within the Information Technology Infrastructure Library (ITIL) framework 12, as well as AS/ISO 27002, which covers information security incident management. An organisation should contractually agree with the outsourcing provider on how security incidents should be investigated and corrective actions taken, particularly those to be taken in an emergency. In addition to conventional contingency planning and disaster recovery, the organisation should contract with the service provider about managing incidents involving sustained electronic attacks which may threaten the ability of the service provider to continue to operate the service in accordance with the security control requirements. Incident management principles do not change under a cloud based outsourcing arrangement from those within a traditional arrangement
22 Termination and Transition A contract can be terminated (discharged) for a number of reasons, including: the outsourcing provider fulfilling all obligations; mutual agreement; due to underperformance; a breach of contract; or as a matter of convenience 13. Security risks at this stage of the contract lifecycle may include: the service provider s failure to return all required materials; and disagreement with regard to a final payment, or the submission of unforseen additional costs by the service provider. There are additional security risks to consider if an organisation is discharging an agreement with one service provider and transitioning IT functions to another service provider. These include: failure to properly manage the transition process; disruption to the provision of products and services; and failure to address performance problems (particularly if the impetus for termination and transition was poor performance) within the previous outsourcing arrangements. If an organisation has discharged a contractual arrangement, and commenced a tender process to engage another service provider, it should manage the process of retendering in line with probity requirements, particularly where the existing (or previous) service provider is re-tendering. The existing, or previous service provider, must be treated in the same way as any other tender applicant. The organisation should also ensure that the existing, or previous service provider is only privy to information about the process that is freely available to other tender applicants. An organisation s contract with the IT service provider should detail how security will be managed in event of termination and/or the transition of the contract. For further information on termination and transition, please refer to Appendix C. Once again, under a cloud based outsourcing arrangement a Critical Infrastructure Provider will need to define a clear set of transition or termination arrangements within the contract. Given the nature of using cloud for the provision of services, 13 Developing and Managing Contracts, Getting the Right Outcome, Paying the Right Price, ANAO Best Practice Guide, February 2007, p
23 which is largely homogenous, the compatibility between one provider and another can be highly variable. This in turn can mean that whilst a cloud-based arrangement may deliver greater cost efficiencies throughout the delivery of the service, the costs associated with changing providers or delivery mechanisms (e.g. to an in-sourced arrangement) may be costly and complex in its nature. Conclusion The outsourcing of services has the potential to deliver both strategic and economic benefits for critical infrastructure providers. However, as this guide has shown, prior to the commencement of any outsourcing arrangement, a careful consideration of risks and threats, the structure of contractual arrangements and compliance obligations must take place. For a critical infrastructure provider, the design and implementation of sound information security principles and practices should be of paramount importance and integrated throughout each and every business process prior to entering into any agreement for the outsourcing of services. As has been discussed throughout the guide, the outsourcing of services may transfer the responsibility for the delivery of services to a third-party provider, however the responsibility to for sound information security governance and risk management always remains the responsibility of the organisation throughout the life of the arrangements. This guide has sought to raise awareness regarding the need for organisations to consider their responsibilities to maintain sound information security principles and practices from both a legislative and operational perspective when considering the outsourcing of services. Further information on information security principles can be found on the TISN website ( and within the accompanying Executive Overview of this guide. 23
24 4. Appendices Appendix A Example Organisational and Service Provider Roles and Responsibilities The table below provides an overview of the typical organisational roles and security responsibilities required for the effective execution of an outsourcing arrangement. In all cases, the resources should have the commensurate experience required to fulfil the responsibilities required of the role. Example organisational roles and security responsibilities Outsourcing Project Sponsor Responsible at the organisational level for ensuring that: security risks and compliance requirements are defined; the level of residual risk is understood and agreed to by the organisation; security requirements are framed in the context of the organisational enterprise strategy; an appropriate security framework is defined; newly identified security risks during the outsourcing lifecycle have been appropriately assessed; and assurance that security risks are managed and processes are in place and operating effectively. Outsourcing Project Security Manager Responsible at the project level for ensuring that: security risks and compliance requirements have been understood by the organisation s outsourcing team; the acceptable level of residual risk is achieved throughout the project on behalf of the organisation; security requirements are clearly articulated; processes are in place to sustain effective security risk management; and incidents are reported, investigated, and corrective actions taken, where appropriate. 24
25 Outsourcing Procurement Manager Responsible for ensuring that contracts and schedules: clearly articulate the security risks and compliance requirements; contain reference to all legislative and compliance obligations; incorporate IT security requirements within the procurement documentation and associated schedules; and contain well-structured and enforceable SLA s that can be, both delivered and audited for compliance. Outsourcing Transition and Service Manager Appointed in-house assessor, qualified third party assessor, or auditor Accountable for ensuring that outsourced services are managed such that: security risks and compliance requirements are met; security requirements are clearly understood; the organisational level of residual risk is supported by the delivered service; security risks are effectively managed during the outsourcing lifecycle; assurance is gained that security risks are managed and that processes are in place to sustain security risk management, and ensure that incidents are reported and investigated. Responsible for ensuring that: the security controls, implemented by the service provider correspond to those required in the contract; assurance is gained against the management of security risks and that processes are in place to sustain security risk management; and incidents are reported, investigated and corrective actions are taken. 25
26 Example service provider roles and security responsibilities Commercial Director Responsible for preparing the bid response, and subsequently delivering, the outsourcing contract with accountability for ensuring that: security risks and compliance requirements meet the defined requirements of the organisation; the acceptable level of residual risk will be maintained by the outsourcing provider; security risks are managed throughout the outsourcing lifecycle; assurance is gained and provided to the organisation, that security risks are managed and that processes are in place to sustain security risk management; incidents have been reported, investigated and that corrective actions are taken; and representations made to the organisation are complete and true. Provider Transition and Service Manager Accountable for ensuring that outsourced services continue to be managed such as: the organisation s security risks and compliance requirements are met throughout the transition and operation of the service; the agreed level of organisational residual risk is supported through the provision of the service; assurance is maintained over the management of security risks and that processes are in place to sustain security risk management, and incidents are reported, investigated and that corrective actions are taken. 26
27 Outsourcing Security Manager Accountable to the above managers for operationally ensuring that: security risks and compliance requirements are met throughout the delivery of the service; the acceptable level of residual risk is agreed by the organisation; security risks are managed effectively and actively throughout the delivery of the service, incidents are reported, investigated and that corrective actions are taken; and performance improvement suggestions regarding IT security are proposed throughout the delivery of the service. 27
28 Appendix B Assurance Tools and Mechanisms Information security assurance throughout an outsourcing arrangement may be achieved through a variety of mechanisms. The table below provides an organisation seeking to utilise the outsourcing of services with a range of useful assurance tools and mechanisms. Method Regular security management scorecards and reporting Approach The organisation should contractually agree with the service provider to provide regular reporting on performance of the outsourced functions, with specific reference to information security incidents, emerging threats, and changes to the regulatory environment affecting both the organisation and the service provider. Service provider commissioned security audits Provider commissions regular independent reviews or tests of the security of the systems being operated, and reports to the organisation the results of the reviews, corrective actions identified, and the progress of work to address the corrective actions. Organisation commissioned security reviews Organisation commissions own (or independent) auditors to review or test the security of provider s systems. Organisation may require that systems are formally accredited these processes should be agreed as part of the security requirements for the system. SAS70 review Organisation contractually requires provider to provide a management attestation and to commission a third party audit review, for example using SAS70 principles and which may be a formal SAS70 audit, to provide assurance that control objectives have been complied with. AS/ ISO 27002:2006 may be used as a basis to identify control areas to be specified, although other security standards may also be used. 28
29 Letters of assurance The provider to supply the organisation with a report verifying that security is operating in accordance with the organisations security requirements, compliance requirements, assessment of risk, and that there has been no known or suspected security incidents other than those already reported in writing. The provider should procure the counter-signature of a regulated Auditor on the letter of assurance. AS/ ISO Certification The organisation and provider agree the risk assessment, compliance requirements specification and control objectives to be used as the basis of the ISO27001 ISMS. The AS/ISO27001 Statement of Applicability is defined to include the entire scope of the outsourcing contract and all people, processes, facilities and systems supporting it if full coverage is to be achieved. Provider implements, operates, monitors, reviews, maintains and improves the ISMS in accordance with ISO 27001, carrying out all ISO27001 requirements. Provider commissions ISO27001 registered auditor to review the ISMS and grant ISO27001 certification. At the organisation s option, the provider contracts with a regulated audit firm that is certified against ISO27001 to provide dual assurance, comprising ISO27001 certification and a SAS70 opinion. 29
30 Appendix C Outsourcing Termination and Transition Arrangement Organisational and Service Provider Contractual Obligations The table below outlines, at a high level, the typical organisational and service provider contractual obligations during the transitional period of moving to a new service provider and/or during the termination of an existing outsourcing arrangement. Upon transition How the service provider will work with the new service provider to transition outsourced IT systems in accordance with an agreed service termination process; What arrangements are in place to ensure that the ISMS is transitioned to the new IT service provider in accordance with a contractually agreed ISMS termination plan; Assurance that a transition will be properly managed and that there will be minimal disruption to services; and Evaluation in relation to the performance of the contract, service provider and the organisation, and that any lessons learned will be incorporated into new arrangements, and if necessary, requirements to update internal policies and procedures to reflect any lessons learned. Upon termination Ensure the service provider will supply the organisation with documents, files, procedures, configurations, drawings or records relating to the organisation s services, and destroy all information on storage media such as disks and tapes; Record and make clear any intellectual property rights; Ensure that there are sufficient steps taken to terminate access rights or arrangements, which can include making sure that all administrative accounts are disabled or reset, and that all remote management systems are disabled or blocked; and Ensure deliverables are supplied in accordance with agreed standards and that triggers for final payment are articulated. 30
31 Appendix D Indicative Change Management Initiation and Cost Responsibilities 14 The table below outlines the indicative change management initiation and cost responsibilities within an outsourcing arrangement. Type of change Variations in contract scope. Variations in service level. Variations in system or process functionality. Variation in system or process performance. Organisation-defined variation in service location(s). Increased need for vulnerability management in organisation-specified technologies. Change in organisation-issued policies or standards. Organisation-caused variations in the security business impact or threat. Organisation-caused security incident investigation. Responsibility Organisation Provider-initiated changes to service provision technologies, location(s), and people. Increased need for vulnerability management in Provider-specified technologies. Provider-caused variations in the security business impact or threat. Security incidents in provider 3rd party organisations (sub-contractor) which impinge upon the organisation or their systems. Service Provider Changes in the assessed level of threat Legislative, regulatory, or compliance change or externally caused security incident. Negotiated 14 Outsourcing: Security Governance Framework for IT Managed Service Provision, Good Practice Guide 2 nd Edition, Centre for the Protection of National Infrastructure, June 2009, p 27 31
32 Appendix E Contract Lifecycle and Security Activities Each of the contract lifecycle stages and their relevant IT security activities are outlined in the table below: Stage Activities IT Security activities High level Organisation defines services required Organisation defines security requirements (Stage 1) under outsourcing arrangement. Organisation issues requirements to related requirements under outsourcing arrangement. providers and invites response. Organisation invites responses as to suggested methods of managing security. Carry out risk assessment (Stage 1) Organisation carries out risk assessment and defines compliance requirements. Specify security risks to be managed. Define statement of security compliance, regulatory, architectural, and policy requirements. Detailed statement of requirements (Stage 1) Develop detailed statement of requirements for outsourcing arrangement. Organisation decides preferred method of managing security. Organisation validates security approach complies with internal and external assurance requirements. Choose appropriate service provider (Stage 2) Organisation identifies selection criteria. Organisation evaluates provider responses. Identify selection criteria relating to security. Evaluate provider s security responses. Ensure bids address information and IT security aspects. Verify provider s IT security capability. 32
33 Contract negotiation (Stage 2) Negotiation and finalisation of contract. Contract and contract scope change processes incorporated into the contract. Agree and finalise contract security aspects. Ensure security related contract and scope change processes are incorporated in contract. Service build and transition (Stage 2) Provider builds necessary systems required for transition to outsourcing arrangement. Provider transitions services from organisation to provider. Provider manages security in accordance with contract to ensure all requirements are met. Provider ensures assurance as per contract. Provider and organisation jointly plan and execute transition security activities. Provider and organisation cooperate on agreed security accreditation reviews. Operate service, monitor and report on provider performance (Stage 3) Change management (Stage 3) Provider operates system in accordance with contract and Service Level Agreements. Performance of system monitored. Provider manages change in accordance with agreed change management processes. Provider supplies security related reports, reviews, and audits as outlined in contract and Service Level Agreements. Provider manages security related change in accordance with security change processes. Manage transition arrangements to a new contract with a service provider (Stage 4) Provider works with new provider to transition services in accordance with agreed service termination processes. Provider transitions existing ISMS to new provider in accordance with agreed service termination processes. 33
34 Appendix F Useful Resources and Reference Material Standards AS/NZS ISO/IEC 27001:2006, Information technology Security techniques Information security management systems Requirements, Standards Australia, Sydney, 2006 AS/NZS ISO/IEC 27002:2006, Information technology Security techniques Code of practice for information security management, Standards Australia, Sydney, 2006 Control Objectives for Information and related Technology (COBIT) V4.1, IT Governance Institute, Rolling Meadows,2007 Statement on Auditing Standards No. 70: Service Organizations (SAS70), American Institute of CPAs Information Technology Infrastructure Library (ITIL), Office of Government Commerce (OGC) Trusted Information Sharing Network (TISN) Achieving IT Resilience Summary Report for CIOs and CSOs, May 2010 Secure Your Information: Information Security Principles For Enterprise Architecture, June 2007 Mobile Device Security Information for CIOs/CSOs, TISN May 2009; IT Security Governance: CIO, CISO, and Practitioner Guidance, Revision 2, December 2009 Critical Infrastructure Resilience: Whose Responsibility is it?, 2009 Defence in Depth, June 2008 Australian Government Cyber Security Strategy, Australian Government, November 2009 Australian Government s Critical Infrastructure Resilience Strategy, Australian Government, June 2010 Other Resources Outsourcing: Security Governance Framework for IT Managed Service Provision, Good Practice Guide 2nd Edition, Centre for the Protection of National Infrastructure, June 2009 IT Security Management Audit Report No. 23, Australian National Audit Office, Dec 2 Jericho Forum Commandment, 34
Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement.
Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement June 2011 DISCLAIMER: This document is intended as a general guide only.
Managing IT Security When Outsourcing to an IT Service Provider: Guide for Owners and Operators of Critical Infrastructure
Managing IT Security When Outsourcing to an IT Service Provider: Guide for Owners and Operators of Critical Infrastructure May 2007 DISCLAIMER: To the extent permitted by law, this document is provided
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
OUTSOURCING: SECURITY GOVERNANCE FRAMEWORK FOR IT MANAGED SERVICE PROVISION GOOD PRACTICE GUIDE 2 ND EDITION
Ongoing personnel security: A good practice guide OUTSOURCING: SECURITY GOVERNANCE FRAMEWORK FOR IT MANAGED SERVICE PROVISION GOOD PRACTICE GUIDE 2 ND EDITION JUNE 2009 Abstract This paper provides a guide
AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES
AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
ADRI. Advice on managing the recordkeeping risks associated with cloud computing. ADRI-2010-1-v1.0
ADRI Advice on managing the recordkeeping risks associated with cloud computing ADRI-2010-1-v1.0 Version 1.0 29 July 2010 Advice on managing the recordkeeping risks associated with cloud computing 2 Copyright
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015
NSW Government Data Centre & Cloud Readiness Assessment Services Standard v1.0 June 2015 ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 [email protected]
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Proposed guidance for firms outsourcing to the cloud and other third-party IT services
Guidance consultation 15/6 Proposed guidance for firms outsourcing to the cloud and other third-party IT services November 2015 1. Introduction and consultation 1.1 The purpose of this draft guidance is
Business Continuity Management Framework 2014 2017
Business Continuity Management Framework 2014 2017 Blackpool Council Business Continuity Framework V3.0 Page 1 of 13 CONTENTS 1.0 Forward 03 2.0 Administration 04 3.0 Policy 05 4.0 Business Continuity
Sytorus Information Security Assessment Overview
Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)
Security in the Cloud: Visibility & Control of your Cloud Service Providers
Whitepaper: Security in the Cloud Security in the Cloud: Visibility & Control of your Cloud Service Providers Date: 11 Apr 2012 Doc Ref: SOS-WP-CSP-0412A Author: Pierre Tagle Ph.D., Prashant Haldankar,
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
OUTSOURCING INVOLVING SHARED COMPUTING SERVICES (INCLUDING CLOUD) 6 July 2015
OUTSOURCING INVOLVING SHARED COMPUTING SERVICES (INCLUDING CLOUD) 6 July 2015 Disclaimer and Copyright While APRA endeavours to ensure the quality of this publication, it does not accept any responsibility
Information Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
Procuring Penetration Testing Services
Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat
Risk Management Policy and Framework
Risk Management Policy and Framework December 2014 phone 1300 360 605 08 89589500 email [email protected] location 1Bagot Street Alice Springs NT 0870 post PO Box 2257 Alice Springs NT 0871
Overview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India
CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13
Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...
Cloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
How To Manage Risk On A Scada System
Risk Management for Industrial Control Systems (ICS) And Supervisory Control Systems (SCADA) Information For Senior Executives (Revised March 2012) Disclaimer: To the extent permitted by law, this document
CPNI VIEWPOINT 01/2010 CLOUD COMPUTING
CPNI VIEWPOINT 01/2010 CLOUD COMPUTING MARCH 2010 Acknowledgements This viewpoint is based upon a research document compiled on behalf of CPNI by Deloitte. The findings presented here have been subjected
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
White Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
Information Security: Cloud Computing
Information Security: Cloud Computing Simon Taylor MSc CLAS CISSP CISMP PCIRM Director & Principal Consultant All Rights Reserved. Taylor Baines Limited is a Registered Company in England & Wales. Registration
An example ITIL -based model for effective Service Integration and Management. Kevin Holland. AXELOS.com
An example ITIL -based model for effective Service Integration and Management Kevin Holland AXELOS.com White Paper April 2015 Contents Introduction to Service Integration and Management 4 An example SIAM
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Cloud Computing in a Government Context
Cloud Computing in a Government Context Introduction There has been a lot of hype around cloud computing to the point where, according to Gartner, 1 it has become 'deafening'. However, it is important
Financial Services Guidance Note Outsourcing
Financial Services Guidance Note Issued: April 2005 Revised: August 2007 Table of Contents 1. Introduction... 3 1.1 Background... 3 1.2 Definitions... 3 2. Guiding Principles... 5 3. Key Risks of... 14
VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
Securing the Cloud Infrastructure
EXECUTIVE STRATEGY BRIEF Microsoft recognizes that security and privacy protections are essential to building the necessary customer trust for cloud computing to reach its full potential. This strategy
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Cloud Computing in a Regulated Environment
Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2
NSW Government. Cloud Services Policy and Guidelines
NSW Government Cloud Services Policy and Guidelines August 2013 1 CONTENTS 1. Introduction 2 1.1 Policy statement 3 1.2 Purpose 3 1.3 Scope 3 1.4 Responsibility 3 2. Cloud services for NSW Government 4
GUIDELINE ON THE APPLICATION OF THE OUTSOURCING REQUIREMENTS UNDER THE FSA RULES IMPLEMENTING MIFID AND THE CRD IN THE UK
GUIDELINE ON THE APPLICATION OF THE OUTSOURCING REQUIREMENTS UNDER THE FSA RULES IMPLEMENTING MIFID AND THE CRD IN THE UK This Guideline does not purport to be a definitive guide, but is instead a non-exhaustive
East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?
East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management
Information Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
A GOOD PRACTICE GUIDE FOR EMPLOYERS
MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade
Big Data Analytics Service Definition G-Cloud 7
Big Data Analytics Service Definition G-Cloud 7 Big Data Analytics Service Service Overview ThinkingSafe s Big Data Analytics Service allows information to be collected from multiple locations, consolidated
UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public. 2:51 Outsourced Offshore and Cloud Based Computing Arrangements
Defence Security Manual DSM Part 2:51 Outsourced Offshore and Cloud Based Computing Arrangements Version 1 ation date July 2105 Amendment list 23 Optimised for Screen; Print; Screen Reader Releasable to
The Cadence Partnership Service Definition
The Cadence Partnership Service Definition About Cadence The Cadence Partnership is an independent management consultancy, specialising in working with a wide range of organisations, solving complex issues
Infrastructure Information Security Assurance (ISA) Process
Infrastructure Information Security Assurance (ISA) Process Handbook AS-805-B March 2005 Transmittal Letter A. Explanation. As part of the Postal Service s efforts to enhance security across all technology
VENDOR MANAGEMENT. General Overview
VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor
Internal Audit Progress Report Performance and Overview Committee (19 th August 2015) Cheshire Fire Authority
Internal Audit Progress Report (19 th August 2015) Contents 1. Introduction 2. Key Messages for Committee Attention 3. Work in progress Appendix A: Risk Classification and Assurance Levels Appendix B:
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Information Security Guideline for NSW Government Part 1 Information Security Risk Management
Department of Commerce Guidelines Information Security Guideline for NSW Government Part 1 Information Security Risk Management Issue No: 3.2 First Published: Sept 1997 Current Version: Jun 2003 Table
IT Security Management
The Auditor-General Audit Report No.23 2005 06 Protective Security Audit Australian National Audit Office Commonwealth of Australia 2005 ISSN 1036 7632 ISBN 0 642 80882 1 COPYRIGHT INFORMATION This work
Information Security Management System (ISMS) Policy
Information Security Management System (ISMS) Policy April 2015 Version 1.0 Version History Version Date Detail Author 0.1 18/02/2015 First draft Andy Turton 0.2 20/02/2015 Updated following feedback from
Embrace the G-Cloud. Ultra Secure Colocation Services for the Public Sector. thebunker.net Phone: 01304 814800 Fax: 01304 814899 info@thebunker.
Embrace the G-Cloud Ultra Secure Colocation Services for the Public Sector 1 Phone: 01304 814800 Fax: 01304 814899 info@ Contents Introduction What is G-Cloud? Types of accreditation: Business Impact Levels
CITY UNIVERSITY OF HONG KONG
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Contract and Vendor Management Guide
Contents 1. Guidelines for managing contracts and vendors... 2 1.1. Purpose and scope... 2 1.2. Introduction... 2 2. Contract and Vendor Management 2.1. Levels of management/segmentation... 3 2.2. Supplier
OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA, CRISC Senior Auditor:
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Executive Summary As cloud service providers mature, and expand and refine their offerings, it is increasingly difficult for
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Cloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Please insert supplier details below Supplier name Address Isuz Ltd. trading as Schoolcomms
(a) the kind of data and the harm that could result if any of those things should occur;
Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data
AN OVERVIEW OF INFORMATION SECURITY STANDARDS
AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
State Records Guideline No 25. Managing Information Risk
State Records Guideline No 25 Managing Information Risk Table of Contents 1 Introduction... 4 1.1 Purpose... 4 1.2 Authority... 4 2 Risk Management and Information... 5 2.1 Overview... 5 2.2 Risk management...
NSW Government. Cloud Services Policy and Guidelines
NSW Government Cloud Services Policy and Guidelines August 2013 CONTENTS 1. Introduction 2 1.1 Policy statement 3 1.2 Purpose 3 1.3 Scope 3 1.4 Responsibility 3 2. Cloud services for NSW Government 4 2.1
Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions
Financial Conduct Authority Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions Introduction 1. A firm has many choices when designing its operating model
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
Module 12 Managed Services TABLE OF CONTENTS. Use Guidelines
1 Module 12 Managed Services Version 3.0 TABLE OF CONTENTS 1. AGREED TERMS AND INTERPRETATION... 2 2. TERM OF... 4 3. TRANSITION IN... 4 4. SERVICES... 10 5. SERVICE LEVELS... 12 6. CHANGE CONTROL... 13
Network Security: Policies and Guidelines for Effective Network Management
Network Security: Policies and Guidelines for Effective Network Management Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. [email protected], [email protected]
Third Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services
Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4 3.2 Service description...
ISO/IEC 27001 Information Security Management. Securing your information assets Product Guide
ISO/IEC 27001 Information Security Management Securing your information assets Product Guide What is ISO/IEC 27001? ISO/IEC 27001 is the international standard for information security management and details
Blending Corporate Governance with. Information Security
Blending Corporate Governance with Information Security WHAT IS CORPORATE GOVERNANCE? Governance has proved an issue since people began to organise themselves for a common purpose. How to ensure the power
www.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
Information Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
Auxilion Service Desk as a Service. Service Desk as a Service. Date January 2015. www.auxilion.com Commercial in Confidence Auxilion 2015 Page 1
Title Service Desk as a Service Date January 2015 www.auxilion.com Commercial in Confidence Auxilion 2015 Page 1 1. Disclaimer All information contained in this document is provided in confidence to the
Outsourcing and Information Security
IBM Global Technology Services Outsourcing and Information Security Preparation is the Key However ultimately accountability cannot be outsourced February 2009 page 2 1. Introduction 3 1.1 Reason for outsourcing
2014 HIMSS Analytics Cloud Survey
2014 HIMSS Analytics Cloud Survey June 2014 2 Introduction Cloud services have been touted as a viable approach to reduce operating expenses for healthcare organizations. Yet, engage in any conversation
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
Outsourcing. What is it and what are the options? LODESTAR
Outsourcing What is it and what are the options? LODESTAR Executive summary Since it first emerged as an option in the mid eighties, outsourcing has been one of the most hotly debated issues in IT. These
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Contract Management Guideline
www.spb.sa.gov.au Contract Management Guideline Version 3.2 Date Issued January 2014 Review Date January 2014 Principal Contact State Procurement Board Telephone 8226 5001 Contents Overview... 3 Contract
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
Securing The Cloud With Confidence. Opinion Piece
Securing The Cloud With Confidence Opinion Piece 1 Securing the cloud with confidence Contents Introduction 03 Don t outsource what you don t understand 03 Steps towards control 04 Due diligence 04 F-discovery
Risk Management Framework
Risk Management Framework Mandate and commitment Design of framework for managing risks Continual improvement of the framework Implementing risk management Monitoring and review of the framework Source:
