Compliance to the ISO 27001 standard and associated controls helps an organization to understand information security risks and develop an information security management system (ISMS) in order to address the risks identified. The ISO 27001 implementation process aims to provide management an intuitive understanding of information security. However, management also requires answers to the following questions in order to take effective strategic and tactical business decisions regarding information security management system (ISMS) and plan future investments in information security accordingly. (Brotby, 2009)
- How secure is the organization at present?
- How much security is enough?
- How do we know when we have achieved the required level of security?
- What are the most cost-effective solutions?
- How do we prevent over-spending on IT assets or under-protecting assets?Market differentiation due to positive influence on company prestige
- How well can risk be predicted?
- What level of maturity have the controls that are implemented so far achieved?
- Is the security program going in the right direction?
ISO 27004 provides guidance and describes a set of best practices for measuring the result of ISMS in an organization. The standard specifies how to set up a measurement program, what parameters to measure, when to measure, how to measure and helps organizations to decide on how to set performance targets and success criteria. Need for measuring security
It is often quoted that it is impossible to manage something that you cannot measure accurately. This applies to information security as it does for other fields.
Effectiveness measurements will help an organization to determine whether any ISMS processes or controls need to be improved or managed in a better way. Good metrics produce quantifiable values in the form of numbers and percentages that are necessary to facilitate management attention and analysis.
Measurements provide single-point-in-time views of specific, discrete factors, while metrics are derived by comparing to a predetermined baseline two or more measurements taken over time. (Payne, 2009).
Technical security metrics provide an assurance in the capability of systems or products in detecting, protecting and responding to security threats.
According to the ISO 27004 standard, the kind of measurements that are required would depend on the size and complexity of the organization, cost benefit to the organization and the level of integration of information security in the overall business processes of the organization.
How to measure security
ISO 27004 defines how data should be collected and analyzed, how measurements should be constructed and how the measurement program should be documented and integrated into the ISMS. (Steffen Weiss, 2005)
The standard provides Plan-do-check-act (PDCA) model for measurement of security where
- Plan phase consists of integration with the ISMS and identification of the objects to be measured
- Do phase consist of the actual implementation of the security metric
- Check Phase consists of the monitoring and review of results
Act Phase consists of improvements to ISMS measurement and implementation
Select processes and objects for measurement:
Organizations need to define what needs to be measured and the scope of measurement. Only well documented processes that are consistent and repeatable should be considered for measurement. An object may include processes, plans, projects, resources, and systems, or system components. Objects of measurement can also be performance of controls or processes, behavior of personnel, and activities of units responsible for information security. (Tarnes, 2012)
Baseline values that indicate point of reference should be defined for each object that is being measured. Threshold values, targets or patterns that indicate an acceptable level of performance must be finalized and approved by the relevant stakeholders.
Collecting timely, accurate, measurable, multi dimensional data from systems and processes that are in the scope of measurement would be the most critical activity in creating security metrics. Automated data collection techniques can be used to achieve standardized data collection and reporting.
Develop a measurement Method:
According to ISO 27004, logical sequence of operations are applied on various attributes of the object that is selected for measurement, in order to arrive at an output ‘indicator’ that makes sense for stakeholders. These indicators can be used as data sources for improving performance of information security programs.
Interpret measured values:
Having processes and technology for analysis and interpretation of quantitative and qualitative measurement values (indicators) would be the next step in ISMS measurement. The analysis of results from measurement process should identify gaps between the baseline value and the actual measurement value.
Communicate measurement values:
Outputs of ISMS measurement should be communicated to relevant stakeholders. Measurement values can be communicated in the form of charts, operational dashboards, reports or newsletters. A comparable, consistent result from the measurement process forms the basis for the management review meeting decisions and ISMS improvement activities.
Advantages of implementing ISO 27004 based measurement
The following list shows some of the advantages of implementing ISO 27004:
- Provides seamless integration with the ISO 27001 standard based ISMS
- Provides structured, quantitatively focused, and easy to understand metrics and measurements
- Provides constant review of trends and better visibility of security risks and weak links in the security posture
- Provides comparability of the security at different times and between different organizations.
- Provides increased accountability and improved information security effectiveness
- Assists in management review and provides decision indicators for continual improvement of ISMS
- Provides quantifiable inputs for resource allocation decisions
- Creates comprehensive repository for security metrics data
- Provides streamlined security reporting process
- Provides overall data security, cost savings and increased efficiency