Designing an Effective Information Security Policy for Public Organizations: ISO 27001 as a Success Framework

Designing an Effective Information Security Policy for Public Organizations: ISO 27001 as a Success Framework

Yassine Maleh, Mustapha Belaissaoui
DOI: 10.4018/978-1-7998-3473-1.ch081
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter aims to study the success factors of the ISO 27001 framework related to the implementation of information security in organizations, with particular emphasis on the different maturity controls of ISO 27001 in the implementation of information security policies in organizations. The purpose of this paper is to investigate what controls are commonly used and how they are selected to the implementation of information security in large public organizations in Middle East and North Africa MENA through ISO 27001, with a specific focus on practical framework for the implementation of an effective information security policy through ISO27001. The finding will help organizations to assess organizations to implement an effective information security policy.
Chapter Preview
Top

Introduction

Information Systems (IS) are today an integral part of the functioning of public administrations and bodies, the activity of businesses and the way of life of citizens. The security of these information systems has become a major issue for all public or private sectors, which would be very strongly affected in the event of serious malfunctions (T. R Peltier, 2016).

Information security policy is the general term used to describe any document that transmits an element of the security program in order to ensure compliance with the organization's security goals and objectives. Since this definition covers a wide range of security policy documents, it is useful to describe the various types of information security policies that an organization may use. The terms used below to describe these types of information security policies are generally used in the information security industry and will be used consistently throughout this paper (Ifinedo, 2014). However, it is not unusual for a government organization or agency to have different names for the same types of information security policies. For example, in many organizations and certainly in government departments, the word “policy” is closely associated with laws and regulations (Rees, Bandyopadhyay, & Spafford, 2003). In these cases, a limited number of individuals (e.g., the legislature) have the power to create a policy, so that an information security policy is generally referred to by other names such as “information security statement”, or “information security document” or other terms avoiding the use of the word “policy”. The term used by an organization to describe these documents is irrelevant. The overall organization and completeness of these documents are important (Hong, Chi, Chao, & Tang, 2006).

The Information Systems Security Policy (ISSP) reflects the expectations and requirements of the Executive Management with regard to the Information System (Canavan, 2003; Höne & Eloff, 2002b)(Canavan, 2003). It must take into account at least the needs in terms of availability, confidentiality and integrity of applications and data used and transiting on networks and systems. It consolidates a set of technical, organizational, legal and human security rules and principles to ensure an efficient and uniform level of security (Fomin, 2008). The ISSP is the counterpart of the Information Systems Master Plan for security. It can lead to an ISSP action plan that prioritizes projects to meet ISSP objectives. The objectives of the Information Systems Security Policy (ISSP) are described in figure 1.

Figure 1.

Information system security policy objectives

978-1-7998-3473-1.ch081.f01

There are several standards and best practice guidelines to assist organizations in implementing an information systems security policy such as ISO 27000, ISACA, NIST, etc. ISO 27001 (ISECT, 2012) is an international standard that is part of the ISO 27000 family of standards (Von Solms, 2005). It refers to a set of standards relating to the information security management system. The ISO 27001 standard is a British standard that came into being in October 2005, succeeding in the BS 7799-2 standard. It describes the requirements for the implementation of an Information Security Management System as shown in figure 1. This standard allows companies to choose security measures to ensure the protection of sensitive assets within a well-defined perimeter by implementing a systematic and proactive approach to security risk management.

Figure 2.

A brief history of ISO/IEC 27001

978-1-7998-3473-1.ch081.f02

Key Terms in this Chapter

ISO/IEC 27002:2013: Information security standard (list of controls) published by the International Organization for Standardization (ISO) and by the International Electrotechnical Commission (IEC), entitled Information Technology – Security Techniques – Code of practice for Information Security - Controls.

Integrity: Integrity is the quality of being whole, uncorrupted and complete.

Information Security: Is defined as “a well-informed sense of assurance that information risks and controls are in balance”. The goal of information security is to protect business assets and reduce costs by avoiding security violations and reducing the negative effects they have on an organization.

Encryption: The action of changing the information by using an algorithm to make it unreadable to anyone.

ISO/IEC 27001:2013: Information security standard published by the International Organization for Standardization (ISO) and by the International Electrotechnical Commission (IEC), entitled Information Technology – Security Techniques – Information Security Management Systems – Requirements.

Authentication: Is the process of verifying a claim of identity. Three different types of information can be used for authentication: something you know (a PIN, a password, mother's maiden name), something you have (magnetic swipe card) or something you are (biometrics).

Confidentiality: Data or information prevented from the exposure to unauthorized individuals is labeled as confidential.

Information Security Policy: Is a written, living document outlining the actions and procedures that employees should follow in order to protect an organization’s information security assets, an information security policy outlines the function and tasks of employees in order to protect an organization's information assets.

Top Management: High level management.

Vulnerability: Is a weakness in the organization, network that can be exploited by a threat.

Availability: Information and supporting IT systems should be available to authorised users when needed.

Complete Chapter List

Search this Book:
Reset