Automating Control Frameworks: A Tool for Managing Compliance and Risk in Government Services



Similar documents
Enhancing IT Governance, Risk and Compliance Management (IT GRC)

Governance, Risk, and Compliance (GRC) White Paper

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

Vendor Risk Management Financial Organizations

Information Management and Protection Policy

Identity & Access Management new complex so don t start?

14 October 2015 ISACA Curaçao Conference By: Paul Helmich

How To Ensure Financial Compliance

Role Profile. Ministry of Technology, Innovation and Citizens Services. Assistant Deputy Minister Integrated Workplace Solutions.

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes.

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

STREAM Cyber Security

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation

Information & Asset Protection with SIEM and DLP

A Flexible and Comprehensive Approach to a Cloud Compliance Program

RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES

Cloud Computing An Auditor s Perspective

The USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Privacy Governance and Compliance Framework Accountability

OCC 98-3 OCC BULLETIN

White Paper: The Seven Elements of an Effective Compliance and Ethics Program

Total Protection for Compliance: Unified IT Policy Auditing

Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security,

Registration Information for Lottery Retailers Including Frequently Asked Questions

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

E-Commerce at Wells Fargo. SF IIA/ISACA Presentation

Governance, Risk & Compliance for Public Sector

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations

MASSIVE NETWORKS Online Backup Compliance Guidelines Sarbanes-Oxley (SOX) SOX Requirements... 2

ISO & ISO Legal Compliance Know Your Risk - Reduce your Risk"

Microsoft s Compliance Framework for Online Services

Designing a Data Governance Framework to Enable and Influence IQ Strategy

Security aspects of e-tailing. Chapter 7

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Office of the Auditor General of Canada. Internal Audit of Document Management Through PROxI Implementation. July 2014

How To Manage Security On A Networked Computer System

ITC 19 th November 2015 Creation of Enterprise Architecture Practice

Enabling Data Quality

<Insert Picture Here> Oracle Identity And Access Management

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

Generally Accepted Recordkeeping Principles

Service Alberta BUSINESS PLAN

Information Security Management Systems. Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer

December 21, The services being procured through the proposed amendment are Hosting Services, and Application Development and Support for CITSS.

Key Trends, Issues and Best Practices in Compliance 2014

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

The Next Generation of Security Leaders

Domain 5 Information Security Governance and Risk Management

Supporting Effective Compliance Programs

Address C-level Cybersecurity issues to enable and secure Digital transformation

Taking the pain out of Risk and Compliance Management Systems. Presented by Andrew Batten 23 April 2015

IT Governance Charter

PRESENTATION TOPICS 2/27/2014. Why Update Policies? 21st Century Best Practices for Information Governance & Policies. Why update policies??

CATSA Screening Contractor Management System Standard (2015)

Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices

IT Security & Compliance Risk Assessment Capabilities

NetIQ FISMA Compliance & Risk Management Solutions

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY

Developing National Frameworks & Engaging the Private Sector

Information Security Program CHARTER

Ann Geyer Tunitas Group. CGEIT Domains

SAFEGUARDS FOR PROTECTING PRIVATE DATA - SERVICE PROVIDERS AND CONTRACTORS

GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001

Metrics that Matter Security Risk Analytics

Cyber intelligence exchange in business environment : a battle for trust and data

Information Management

Security audit advice For holders of all remote gambling operator licences including specified remote lottery licences

3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks;

ISMS Implementation Guide

How To Improve Your Business

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Implementing and monitoring effective compliance policies & procedures. charlesrussellspeechlys.com

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT

NERC-CIP S MOST WANTED

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Interagency Science Working Group. National Archives and Records Administration

Ensuring Cloud Security Using Cloud Control Matrix

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

How to Ensure IT Compliance Without Compromising Innovation. Nik Teshima, IBM Phil Odence, Black Duck

Security Services. 30 years of experience in IT business

Convercent Predictive Analytics

Information Technology Security Review April 16, 2012

ISO20000: What it is and how it relates to ITIL v3

Transcription:

: A Tool for Managing Compliance and Risk in Government Services November 19, 2008 Slide 1

Agenda Problem Space Solution Space Describe the compliance and risk management problem Why is this relevant for the BC Government? What makes it difficult to solve? Overview of the GRC software market Describe our work: Control Framework Development tool Thoughts on future direction Purpose: Connect and exchange ideas with others facing the same problems. Slide 2

Manager, Control Practices Unit Manager, BCeID Manager, Mainframe Services Compliance and risk practice development BCeID Corporate Authentication Project Manage outsourced data centre services About me Developing and demonstrating compliance and control in IT shared services Policy and legislation compliance for authentication in e- services Compliance management in external providers Slide 3

Definition: Control and Framework Framework Compliance Requirement Program Standard Controls Organizes IT governance objectives and practices and links them to business requirements and controls. Legislation, policy, or industry standard from an external source. A program policy, standard or guideline, developed internally. A means by which an organization's resources are directed, monitored, and measured. A means to protect the organization's physical and intangible resources by preventing and detecting fraud. Slide 4

Why manage policy and compliance? Up to 174 vehicles were repaired without proper documentation or disclosure. If some fly-bynight mechanic did that he d be running a chop shop and ICBC would land on him with all its might. While the sale of vehicles to employees is standard practice at some companies, ICBC has no policies in place to govern this process. It also admitted the facility and staff time were used for non-business purposes such as repairing employee vehicles. Slide 5

Why manage risk & compliance? Head of BC Lottery Corporation Fired UK politicians want to criminalize data leaks Tainted blood scandal at Red Cross Despite reassuring the public five months ago that everything was fine, the Lottery Corporation knew there were problems and did little to correct them. (Times-Colonist) There is evidence of a widespread problem with government relating to establishing systems for data protection and operating them adequately [the Cabinet Office report] proposed that government officials could face jail if they were found to be grossly negligent in any failure to protect citizens data. (InterGovWorld) Allegations of criminal conduct utterly disproved. The conduct examined in detail over one and a half years confirms reasonable, responsible and professional actions during a difficult time, said the judge. (Times Colonist) Slide 6

Compliance Management Problem Space Threats Increasing public accountability expectations Evolving legislation for confidentiality, discovery, identity Technology change: mobile computing, payment agents Evolving standards: PCI, ISO, COBIT Vulnerabilities Accountability obscured by shared services. Accountability obscured by E-commerce and data sharing. Unstructured risk and control information. Dynamic organizations, PPPs, outsourcing, cross jurisdiction partnerships Slide 7

Owns BCeID Control Environment Identity Management Policy Owner Government Chief Information Officer (GCIO) - Owner of the Information Security Policy - Identity Management Standards and Long-Range Planning - IM/IT Standards and Legislation and Policy to adhere to privacy legislation Manages Manages Document Disposal Act Owns Information Security Policy Business Objectives Program Owner ADM, Workplace Technology Services - Linkage to WTS Objectives - Responsible for compliance to WTS policies and standards Directs Program Manager Director BCeID Program - Owner of BCeID Policies - Authoritative Source Management Core Policy Manual Income Tax Act Partnership Act FIOPPA Electronic Transaction Act Business Number Act (Bill 16 2005) Business Corporation Act Government-CIO Workplace Technology Services BCeID Auditors Service Delivery Partners Program Customers Program Clients Retention & Disposition Compliance Requirements Electronic Records Assurance Levels Collect, Validate and Store Business Numbers BC Corporate Registry Privacy Requirements Collect, Validate and Store Business Numbers Authoritative Source Responsibilities Requirements Program Clients Online Service Owners - Responsible for the security and integrity of the online services Business Objectives Compliance BCeID Operating Policies Operational Procedures Owns Executed by Program Customers Account Holding Businesses and Individuals - Enter into agreements with BCeID Requirements Requirements Implemented by Measure Compliance Report Compliance Compliance by Agreement or Contract Program Activities Compliance by policy Compliance by Agreement or Contract Business Objectives Compliance by policy Maintained by Risk and Compliance Auditors - Measure compliance - Governance issues Service Delivery Partner - WTS Internal - Delivery Units reporting to the Service Owner - Hosting compliance with infrastructure Service Delivery Partner - Government Internal - Delivery Units reporting to other parts of government Service Delivery Partner - External Suppliers - Private sector organizations Service Delivery Partners - Registration Authorities - Establish and vouch for the identity of an entity - Performs registration - Defines the identity - Provides policy content Program Staff (Employees, Contractors) - Execute operating procedures - Maintain and deploy program standards Slide 8

Policy and procedure management Risk and control management Loss and investigation management GRC analytics Facilitate policy/procedure life cycle Publish policies/procedures across roles Map policies/procedures to risks, controls, and compliance requirements Risk and controls assessment automation Manage & model risk data Business rules enforcement Audit management Support corporate investigations into loss Track loss metrics & facilitate remediation Support anonymous whistleblower apps Measure control preparedness/ effectiveness Report GRC data across the organization GRC Software Functions* PO6 PO6.4 PO6, AI2.3, AI2.4 PO9, DS5.5 ME4.5 ME2.4, ME2.5, ME2.6 DS8, DS10 ME2.5, ME3, ME4.5 * Forrester Research Inc, Forrester Wave: Enterprise Governance, Risk, And Compliance Platforms, Q4 2007, 2008 Slide 9

Current Province GRC Tools Policy and procedure management Healthcheck Risk and control management Loss and investigation management GRC analytics Facilitate policy/procedure life cycle Publish policies/procedures across roles Map policies/procedures to Citicus risks, controls, and compliance requirements Risk and controls assessment automation Manage & model risk data Business rules enforcement Audit management ACL Support corporate investigations into loss Track loss metrics & facilitate remediation Support anonymous whistleblower apps Measure control preparedness/ effectiveness Report GRC data across the organization PO6 PO6.4 PO6, AI2.3, AI2.4 PO9, DS5.5 ME4.5 ME2.4, ME2.5, ME2.6 DS8, DS10 ME2.5, ME3, ME4.5 Slide 10

Project Focus: Policy/Procedure Management Policy and procedure management Map policies/procedures to controls and compliance requirements Publish policies/procedures across roles Facilitate policy/procedure life cycle AI2.3, AI2.4 PO6.4 Risk and control management Loss and investigation management GRC analytics Risk and controls assessment automation Manage & model risk data Business rules enforcement Audit management Support corporate investigations into loss Track loss metrics & facilitate remediation Support anonymous whistleblower apps Report compliance gap PO9, DS5.5 ME4.5 ME2.4, ME2.5, ME2.6 DS8, DS10 ME2.4, ME3 * Forrester Research Inc, Forrester Wave: Enterprise Governance, Risk, And Compliance Platforms, Q4 2007, 2008 Slide 11

GRC Suppliers Governance, Risk & Compliance Package Vendors* Libraries: controls, risks, compliance Content Workflow Management Engine Relational Database * Forrester Research Inc, Forrester Wave: Enterprise Governance, Risk, And Compliance Platforms, Q4 2007, 2008 Slide 12

GRC Software Benefit: Big Business & Government IT Systems Profile Jurisdictions Compliance Accountability Big Business Fewer, larger Complementary applications Multiple Wide geographic spread enterprise level Public Sector Many, smaller Silo applications One primary Potential cross jurisdiction program level GRC packages have potential benefit for government, but likely higher (relative) implementation costs. Readiness: Policy, standards & controls ready? Clear accountability? Slide 13

Compliance & Control Environment Strategic Policy Core Policy Manual Authorities: Legislation, high-level policy directives, laws. Tactical Policy I.E. Information Security Policy, Risk Management Ministry policy & IM/IT standards Project Scope Program Standards & Guidelines Program and Service Standards: Policy interpretations, program standards & guidelines Program standards + linkages Operating procedures Role Descriptions Controls & Performance Management User Agreements Supplier Agreements Slide 14

Control Framework Data Model Core Info Compliance Electronic FOIPPA Security Policy & Requirements Trans Policy ProcAct Target Business Service Service Cost Contraints Levels Client Objectives Definition Risks Program Standards Activities Control Objectives Roles Business Objectives define the program deliverables. Compliance requirements and business objectives are interpreted to create the local program standards and program activities. Risks are used to define control objectives and specify control activities. Accountabilities are assigned. Slide 15

Software Functions Slide 16

Global Library & Admin Functions Program design functions Content & Compliance Reports Slide 17

Build a global library of compliance requirements. Example: Core Policy & Procedures. Slide 18

Build a global library of compliance requirements. Example: Payment Card Industry Slide 19

Select the compliance requirements that apply to the program. Slide 20

Create program standards (program policy) and link to compliance, roles, processes Slide 21

Detail accessible via double-click. Slide 22

Document responsibility for program standards, processes. Slide 23

Compliance status = + Program Standard status (approved, implemented, discontinued) + Relationship status (conforms, non-conform, exempt) Slide 24

Report on Program Standards and related Compliance Requirements Slide 25

Detailed report on Program Standards and related Compliance Requirements Slide 26

Summary report of Compliance Requirements showing the related Program Standards Slide 27

Who Uses a Control Framework? Management sees how operational procedures relate to laws & policies. Electronic Core Info Compliance FOIPPA Security Policy Trans & Service Cost Target Business Service Contraints Levels Client Requirements Policy Proc Act Objectives Definition Risks Employees know their tasks and responsibilities. Program Standards Roles Activities Control Objectives Employees know which policies and standards apply to their deliverables and workplace activities. Business analysts, architects, accountants, legal and HR can design procedures and controls to address changing risks. Management and audit can affirm that appropriate controls and accountabilities are in place. Slide 28

Related Areas For Improvement Interpretation Compliance Components Control Expertise Policy translation to standards, standards to standard controls. Grouping by risk categories. Rationalization of legislation, policy, guidelines, etc. to provide single source for program owners. Include compliance in shared services. Clear compliance accountabilities between service provider and receiver. Expertise to match program needs to appropriate frameworks. Expertise to draft control objectives, link policy to procedures and controls. Slide 29

Project Summary? Vision Problem Our Focus Benefits Barriers Sustainable, demonstrated compliance and control. Dynamic policy environment Unstructured, complex information Interpretation gaps Step 1 - Equipping the experts (policy analysts, business analysts, program management) to effectively manage compliance-related information. Manage and communicate complex information. Relate requirements to outcomes to interpret & bridge gaps. Accommodate change. Data collection effort. Policy and control objective development expertise. Fragmented internal policy. Slide 30