Implementing a Security Management System: An Outline

Similar documents
Framework for an Aviation Security Management System (SeMS)

Safety Management Systems (SMS) guidance for organisations

Corporate Risk Management Policy

Security Management Systems (SEMS) for Air Transport Operators. Executive Summary

Asset Management Policy March 2014

NHS ISLE OF WIGHT CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY POLICY

The Levy Control Framework

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement.

Business Plan 2012/13

Hertsmere Borough Council. Data Quality Strategy. December

Solvency II Data audit report guidance. March 2012

Solvency II Own Risk and Solvency Assessment (ORSA)

Government Communication Professional Competency Framework

Business Continuity Management Framework

PART A: OVERVIEW Introduction Applicability Legal Provisions Effective Date...2

THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK

Cyber Security Evolved

Business Continuity Management

Reporting Service Performance Information

How to achieve excellent enterprise risk management Why risk assessments fail

the role of the head of internal audit in public service organisations 2010

FINAL NOTICE Nationwide has confirmed that it will not be referring the matter to the Financial Services and Markets Tribunal.

Enterprise Security Tactical Plan

HMG Security Policy Framework

The PNC Financial Services Group, Inc. Business Continuity Program

Risks and uncertainties

Location of the job: CFO Revenue Assurance

Information Security: Business Assurance Guidelines

Safety Regulation Group SAFETY MANAGEMENT SYSTEMS GUIDANCE TO ORGANISATIONS. April

How Good is Our Council?

SCOTTISH CENSUS INDEPENDENT SECURITY REVIEW REPORT

7 Directorate Performance Managers. 7 Performance Reporting and Data Quality Officer. 8 Responsible Officers

Risk Management & Business Continuity Manual

Digital Continuity to Support Forensic Readiness

A&CS Assurance Review. Accounting Policy Division Rule Making Participation in Standard Setting. Report

Development of An Analysis Tool For Performing Civil Aviation Security Risk Assessment

Improving Residual Risk Management Through the Use of Security Metrics

GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012

Principles for BCM requirements for the Dutch financial sector and its providers.

Appendix 2 - Leicester City Council s Business Continuity Management Policy Statement and Strategy Business Continuity Policy Statement 2015

Information Management Advice 39 Developing an Information Asset Register

The National Safety and Risk Management Diploma Series REGULATORY OVERSIGHT & GOVERNANCE RISK MANAGEMENT SAFETY MANAGEMENT SYSTEMS

Lancashire County Council Information Governance Framework

Improving Community Safety Partnership intelligence-led business processes

RISK MANAGEMENT FRAMEWORK. 2 RESPONSIBLE PERSON: Sarah Price, Chief Officer

INVESTORS IN PEOPLE: WHAT S IT ALL ABOUT? Sue Greener and Tom Bourner

NOT PROTECTIVELY MARKED BUSINESS CONTINUITY. Specialist Operations Contingency Planning Business Continuity Manager

Imagine a world class Heathrow London First policy conclusions

Project Risk Analysis toolkit

ISO 9001:2015 Your implementation guide

Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project

Sales & Operations Planning Process Excellence Program

Agreement on International Civil Aviation (Sops 11/1949), Annex 19 Safety Management) Modification details

Aviation Safety: Making a safe system even safer. Nancy Graham Director, Air Navigation Bureau International Civil Aviation Organization

The APRA Supervision Blueprint

Security & Privacy Current cover and Risk Management Services

Guidance on the requirements of consumer law applicable to the sale and advertising of flights and holidays CAP 1014

FINANCIAL MANAGEMENT MATURITY MODEL

NETWORK SECURITY FOR SMALL AND MID-SIZE BUSINESSES

Technology and Cyber Resilience Benchmarking Report December 2013

BUSINESS CONTINUITY MANAGEMENT FRAMEWORK

University of Sunderland Business Assurance Information Security Policy

Culture in financial services a regulator s perspective

connected excellence in all we do Turnaround Management

Role Description Metro Operations, Data Analyst

PACIFIC ISLANDS FORUM SECRETARIAT FEMM BIENNIAL STOCKTAKE 2012

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience

Network Rail Infrastructure Projects Joint Relationship Management Plan

Conflict management Funmi Olonisaki King s College London

INTERNATIONAL STANDARD ON ASSURANCE ENGAGEMENTS 3000 ASSURANCE ENGAGEMENTS OTHER THAN AUDITS OR REVIEWS OF HISTORICAL FINANCIAL INFORMATION CONTENTS

Policy Profession. Skills and Knowledge framework. Find out more now by going to

Full-time MSc in Logistics and Supply Chain Management

Confident in our Future, Risk Management Policy Statement and Strategy

Securing safe, clean drinking water for all

Guideline. Operational Risk Management. Category: Sound Business and Financial Practices. No: E-21 Date: June 2016

States of Jersey Human Resources Department. Code of Conduct

DATA AUDIT: Scope and Content

Building Tomorrow s Sales Force

Assessment Centres and Psychometric Testing. Procedure

United Kingdom Competition Network (UKCN) Statement of Intent

Audit Quality Thematic Review

P3M3 Portfolio Management Self-Assessment

CQC s strategy 2016 to Shaping the future: consultation document

VISION FOR LEARNING AND DEVELOPMENT

DATA QUALITY STRATEGY

Project Management Assessment Overview

Deriving Value from ORSA. Board Perspective

Policy : Enterprise Risk Management Policy

IndigoBlue Governance Framework

HC 677 SesSIon December HM Revenue & Customs. Managing civil tax investigations

POSITION DESCRIPTION. Role Purpose. Key Challenges. Key Result Areas

Feedback Ferret. Security Incident Response Plan

Security Management. Security is taken for granted until something goes wrong.

Sector Development Ageing, Disability and Home Care Department of Family and Community Services (02)

19. Planning. 19 PLANNING p1

ENTERPRISE RISK MANAGEMENT POLICY

Data Protection Act. Conducting privacy impact assessments code of practice

Asset Management Strategy ( )

Preparing for the Convergence of Risk Management & Business Continuity

Reconciliation Best Practice

Transcription:

Implementing a Security Management System: An Outline CAP 1273

Civil Aviation Authority 2015 All rights reserved. Copies of this publication may be reproduced for personal use, or for use within a company or organisation, but may not otherwise be reproduced for publication. To use or reference CAA publications for any other purpose, for example within training material for students, please contact the CAA for formal agreement. CAA House, 45-59 Kingsway, London WC2B 6TE www.caa.co.uk

The purpose of a Security Management System The purpose of a Security Management System (SeMS) is to enable an organisation to identify and manage its security risks and be assured right up to Board level that the security measures taken to manage those risks are effective. Spot checks and regulatory inspections cannot provide the organisation with continuous assurance of the performance of its security measures. The combination of governance, threat and risk management and performance measurements that alone can provide that assurance equates to a SeMS. It is a system, with many similarities to quality management systems. In short, a SeMS provides the necessary organisational structure, accountabilities, policies and procedures to ensure effective oversight. SeMS Principles For security management to be effective, it has to be a continuous cycle which includes a threat and vulnerability assessment, the identification, capture and analysis of risk, and the generation and continuous review of risk mitigation plans. Risk is a dynamic area and will require continual review against an ever changing threat landscape. A Security Management System (SeMS) achieves these things by providing an organised, systematic approach to managing security which embeds security management into the day-today activities of the organisation. The concept is that: security risks should be managed at the right level, overseen by company boards; activities should be measured to provide management information on security performance; there should be people in the organisation who are accountable for maintaining rigorous security standards, using the management information; and there should be a culture that promotes high security standards throughout the organisation. SeMS in practice To realise that concept, the SeMS requires several practical components to be in place. Many of these may already exist within an entity, but may need to be made more rigorous, reliable, consistent, repeatable, effective or any number of similar adjectives. The SeMS project discussed below is a practical approach to assessing these components and removing loop-holes, weaknesses, gaps and duplications. An organisation could work out the components of a SeMS by analysing what would be required to identify and manage security risks and be assured that the security measures are effective February 2015 Page 3

(the goal outlined above). However the SeMS Framework 1 has been developed in conjunction with industry to save organisations having to start from first principles. It is also designed to deliver a degree of consistency across the industry. The Framework consists of ten chapters describing the components of a SeMS. A simple way to appreciate the contents is to group the ten chapters into three themes: Performance Assurance Risk Assurance The Management System Chapter 5: Performance monitoring, assessment and reporting Chapter 2: Threat and Risk Management Culture and Accountability Chapter 1: Management Commitment Chapter 3: Accountability & responsibilities Chapter 9: SeMS Training & Education Chapter 10: Communication Enablers Chapter 4: Resources Chapter 6: Incident response Chapter 7: Management of change Chapter 8: Continuous improvement It is in Performance Monitoring, Assessment and Reporting where consistency across the industry is vital for SeMS to work nationally. But in order for the performance monitoring to be relevant to the organisation, the Threat and Risk Management must be rigorous and effective. These two chapters therefore need more coordination across organisations than the remaining eight Management System chapters. The CAA will therefore focus the majority of its SeMS effort on helping organisations ensure that they can deliver against the requirements of those two chapters. Performance Assurance An organisation needs to know whether its security processes are functioning correctly and that its investment in security is delivering effective returns. In addition to the data required to demonstrate compliance against regulations, each organisation will want to collect data specific to its own security operation. Security measures are integral to the mitigations in place to address specific threats, and so knowing how effective they are is essential for assuring the overall security picture. In order to gain a comprehensive picture of the state of its security and its compliance against regulations, an organisation will need to establish exactly what it should be measuring; in effect it will need to establish metrics 2 which will give each level of management the required information 1 CAP1223 (Framework for and Aviation Security Management System) and CAP1224 (SeMS - A Guidance Note for Accountable Managers), available from the CAA website. 2 The term Metric is used in this document to signify any measurable indicator of performance. The term Measure is used to refer to security protection or risk mitigation actions. February 2015 Page 4

about security performance. Data which feeds into the metrics will come from many sources, and will include observations, tests, audits, checks of records etc. Broadly speaking metrics will take one of three forms: Quantitative Qualitative Output Metrics that check whether tasks are being carried out as often as they should be or at the right time of day, and so forth. For example, whether sufficient vehicle checks are being carried out or whether recurrent training is being given when it is due. Metrics that check whether tasks are being carried out to the required standards or whether equipment is functioning to the required standards. For example, observations of pat-downs or checks of equipment performance. Metrics that capture the outcomes or outputs that are being delivered. For example, covert tests results or TIP data. Whilst the collection of quantitative performance data is a necessary part of a SeMS, in order to be satisfied that all planned security activities are being carried out, it is only the collection of qualitative and output data that will inform management whether their investment in security systems is delivering the required results. This complete picture will then enable the organisation to address any failings and eliminate the causes of non-compliance with regulations. Once an organisation s SeMS is producing meaningful data on how it is performing against both regulatory requirements and those specific to its own local operation, and is enabling it to demonstrate that it has processes in place to quality assure this data, then this SeMS can be used by the Regulator to contribute to an overall picture of compliance for that organisation. However an organisation chooses to collect, compile and record security performance data, it is important that the duration of time that data will be kept for is defined and that the data is stored both securely and in ways which make it is easy to access and process. Consistency of Metrics The CAA will use selected metrics from each organisation to inform its oversight of the organizations themselves and also of the sector as a whole. Metrics may differ to some degree from one entity to another, and it is clearly impossible for the CAA to reconcile and process hundreds of different types of metric. We will therefore work with industry to define a standard core set of consistent performance metrics 3, to facilitate meaningful sectoral trend analysis. This will also enable the CAA to inform the organisation how well its own performance compares to the sectoral benchmark generally. This consistency is important if the CAA is to be able to use the SeMS results as part of its regulatory regime: without it neither the organisation nor the CAA will gain the benefits of SeMS and the focus of the CAA s regulatory regime will remain on spot-checks of compliance. As an example, the first such set of standard core metrics for airports will be TIP data. Note that this is mandating neither TIP nor SeMS: it is just requiring that those organisations who wish their 3 There may be different core sets for different sectors of the industry. February 2015 Page 5

SeMS to be used by the CAA in its oversight to ensure the outputs are consistent with a standard core set. What about smaller organisations? Exactly the same principles apply. A smaller organisation will still need to know how it is performing against regulations and its security targets. However collecting and analysing security data will be much simpler and could involve nothing more complicated than a single spread-sheet. Risk Assurance In order for the performance monitoring to be relevant to the organisation, the Threat and Risk Management must be rigorous and effective. However good the performance, unless it is focused on the right risks and issues, security cannot be assured. Although an organisation will be advised of national and international threats by the government, it will want to identify any local threats which could affect its operation. For example an airport may be the target for activists opposed to expansion, or a cargo agent may be vulnerable to theft. All such local threats need to be identified and then risk assessed (which includes identifying where the vulnerabilities lie) to allow the appropriate mitigation to be put in place. Many larger organisations are likely to have well established threat and risk assessment processes in place, and can ensure these include the locally identified threats. These additional threats, once assessed, should be in the organisation s risk register, together with the relevant mitigations. Risk will never be reduced to zero, and there needs to be senior management acceptance of the residual risk i.e. acknowledgment that the mitigations are adequate and continuing awareness of how well the mitigations are performing. What about smaller organisations? For smaller organisations, the principle is the same but in practice a small organisation is unlikely to have a formal threat and risk assessment process with a risk register. It will still need to have a way of identifying and dealing with any local threats, which could for example involve being aware of local crime trends in its neighbourhood, and receiving regular updates from the local police. The Management System Wrapped around Performance Assurance and Risk Assurance will be several enabling mechanisms, which together make up the Management System for security. In this section, references to Framework chapters are highlighted in bold text. Culture & accountability For SeMS to work, a culture of security, emanating from the top of the organisation, should be inherent in the actions and behaviours of all of its people, at every level. The level of attention, commitment and support that senior management gives to security should be comparable to that given to other key corporate activities. If the management is committed to SeMS and demonstrates its commitment, this will set the standard for a strong security culture. One tangible way of demonstrating management commitment is by communicating a security policy which embodies the SeMS ethos of the organisation and makes security everyone s shared February 2015 Page 6

responsibility. A security policy is the written evidence of the organisation s commitment to delivering effective security. All staff should be aware of their security roles and responsibilities, and of the decision-making process. This should be reflected in job descriptions, targets, and training as well as clearly defined governance groups, processes and information flow. Enablers Resources must be sufficient and suitable. As well as ensuring that the correct level of resources is provided it is important to ensure they are appropriate for the task. So in the case of the security staff, for example, all will have gone through a recruitment process which ensures they have the necessary aptitude for the job, and their training will have equipped them with the required skills. Third party suppliers are also part of an organisation s resource, and if the provision of certain services is contracted out, the responsibility for what is being delivered remains with the organisation. Any such service will need to be included in the SeMS, and there should be regular quality assurance of what is being provided to ensure that it meets the standards specified by the organisation and the relevant regulations. A security incident could have a major impact on the ability of the organisation to continue its operations. In order to ensure that it is properly prepared to deal with any such event, the organisation should have a security response process, so it can recover swiftly from any disruption. Changes to operational processes or tools may inadvertently compromise security. There should be a change management process that identifies all changes, and that assesses for each of them any deliberate or accidental security impacts or risks. Continuous improvement is not so much a process as the creation of an environment where continuous awareness of performance and the pursuit of improvement are the norm. The SeMS will ensure that there is a flow of security performance information being presented to those who have responsibility for security within the organisation. How that information is acted upon is at the heart of a SeMS. The organisation should seek to build on its strengths and encourage honest discussion about how to remedy poor performance, and how to identify and implement necessary improvements. Any overall improvement will also contribute to enhancing the organisation s resilience. Implementing a SeMS From the description above it is clear that Risk Assurance and Performance Assurance are the elements of the SeMS where consistency across industry is most needed, and that the Management System elements will be more bespoke to an organisation, and also perhaps less challenging for it, with many of the components likely to be substantially in place already or easily established. The CAA will therefore focus the majority of its SeMS effort on helping organisations ensure that their approaches to Risk Assurance and Performance Assurance align closely with the Framework (Chapters 2 and 5 respectively). February 2015 Page 7

We envisage working with SeMS adopters on the basis of three kinds of approach, of differing degree of engagement. All are viable approaches for an organisation to take to implementing SeMS, and with the right balance between them, industry and the CAA will together be able to roll out SeMS at the fastest rate commensurate with effective implementation. The three approaches (or kinds of SeMS adopter ) are these: Pathfinders Close involvement by the CAA with a small number of pathfinders to build experience in Cargo and In Flight Supplies sectors and perhaps to show that the Framework is suitable for all sizes of organisation. A Pathfinder will be fully supported by the CAA in its implementation of SeMS in a new sector or other potentially useful case study organisation. The CAA will provide Pathfinders with support for the implementation of all chapters of the SeMS framework, as it did for the airline and airport SeMS Pathfinders. There is a wish to focus next on SeMS implementation in the Cargo and In Flight Supplies sectors, so as to ensure a complete and consistent picture across all types of directed party, and also to enable any sector specific issues to be addressed. Given the level of resource involved, the CAA will necessarily be able to support only very small numbers of Pathfinders, through a gradual rollout. Performance-focused adopters Focused support by the CAA in respect of the risk and performance assurance aspects for a slightly larger number of organisations. To supplement the low-volume pathfinder roll out, the CAA will promote and support a larger number of performance-focused adopters. The focus of the CAA s support for this kind of adopter will be on those chapters of the Framework covering Threat and Risk Management and Performance Monitoring, Assessment and Reporting. Some predefined standard core metrics will be established, in concert with industry, in order to allow cross-sector data aggregation and analysis, and there will be guidance on using existing templates for threat and risk management. Case studies from previous implementers will provide further assistance, allowing relatively large numbers of organisations to start work on their SeMS, largely self-sufficiently. Independent adopters Occasional contact by the CAA with organisations which choose, and are able, to implement SeMS independently but in line with the Framework. Alongside the two streams of adopters described above, who will each be supported by the CAA, we anticipate that other organisations with already-mature management systems will wish to develop their own SeMS independently of such support. We will provide these organisations with generic guidance based on the results of previous implementations and case studies, especially around the need for consistency in performance reporting. Although we plan to have little direct engagement on SeMS with these independent adopters, we do anticipate occasional calls for advice via the CAA website or the organisation s lead CAA compliance inspector. February 2015 Page 8

SeMS Implementation Guidance Together with DfT and industry, the CAA is developing further guidance on how to go about implementing a SeMS. This will build on experience with the pathfinders and will be augmented and refined as experience and case studies bring further insights. The key recommendations so far are: Treat this as a project, with time set aside for dedicated if not full time resources There is a relatively short burst of activity (typically 6 to 12 months) to create the initial SeMS (Phase 1) followed by a longer period (Phase 2) in which the organisation will adopt the SeMS and make it effective. This initial work can lose momentum and focus if resources are constantly dragged off for other tasks. Follow a step by step approach (although the sequence of the first four steps depends on an organisation s approach and existing structures) Management Commitment Before the project gets too far, the commitment of top management should be secured. The resource for the SeMS project is likely to need top management sanction, and the protection from interference or distractions this should guarantee. The changes in culture and ways of working that the project will bring will need endorsement from the top, to make the senior commitment to SeMS clear. Gap Analysis It is essential to have a good understanding of the organisation s current processes and systems so that areas where additional work is needed to meet the requirements of the SeMS Framework can be identified. Without that, the management commitment represents only blind faith, not an informed choice, and so is at risk when hard decisions are needed. Establish initial performance metrics If existing metrics are suitable, the measurement, reporting and governance arrangements for them should be put in place early. This demonstrates tangible delivery by the project and starts to build a performance culture. For airports, TIP data is one prime example of such a metric. Plan the Project A Gap Analysis will enable a realistic plan to be created, and ensure that the resources are matched to priorities. Again, management commitment can only be tested when the financial, resource and management costs of the project are understood and the resources, finances and management time are provided to meet them. The project plan should focus on the three themes of Risk Assurance, Performance Assurance and the Management System. February 2015 Page 9

Execute Project Plan Normal project disciplines should ensure the project is delivered to plan, although it should be expected that the plan will change as the project progresses. The plan, or the revised plan, will ensure all the right actions are taken at the right time with the right resources. When the project manager is also a subject matter expert, care is needed to ensure sufficient dedicated time is allocated to each of those roles. Phase 1 Assessment SeMS is Present and Suitable When the organisation is ready (typically 6 12 months after starting if there is a dedicated project manager), the CAA will conduct a Phase 1 Assessment to ascertain whether the SeMS is Present and Suitable : is it complete, does it look as though it all works, is the Accountable Manager appropriately senior and has he/she demonstrated full commitment not only to the project but to the ongoing SeMS? Phase 2 Audit SeMS is Operating and Effective Following a successful Phase 1 Assessment, the organisation will continue its SeMS project into Phase 2, developing the SeMS to an Operating and Effective state in which it is using it to manage security, and building up performance data and governance records that provide assurance of this. Throughout Phase 2, the CAA oversight of the organisation will continue to monitor compliance as before, but will receive an agreed subset of the organisation s assurance data, enabling it to build up an accurate picture of the organisation s security management regime. At that end of Phase 2 the organisation will have built up evidence that the SeMS is operating and that its Risk Assurance, Performance Assurance and Management System are all effective. At that point (perhaps 12 months from the successful Phase 1 Assessment) the CAA will conduct a Phase 2 audit. On completion of a successful Phase 2 audit the CAA will be able to start modifying its compliance inspection and enforcement regime for the organisation, insofar as the regulations allow. Regulatory Reform When a sufficient number of organisations have established operating and effective SeMS, the CAA will make use of the data it has assembled to identify areas where the regulatory regime could be more aligned to Better Regulation principles. In doing so it will target both the CAA s oversight of existing regulations, and promotion of improvements to regulations. More stringent measures will be the likelier target for such attention but it is the intention of the DfT and the CAA to take proposals to the European Commission in respect of wider EU regulations, once sufficient evidence is available to support change. This Performance Based approach to Regulation (PBR) is at the heart of CAA s strategic plan. February 2015 Page 10

Further copies of this publication can be downloaded from www.caa.co.uk