the current schema, 79 relationships have
been defined for this matrix.
• Threats vs ISO17799 controls Matrix: We
can associate threats with the ISO17799
controls that affect them. Thanks to the
previous matrixes, we can also give a
security level to an asset by using the
controls associated with it. In the current
schema, 940 relationships have been
defined for this matrix.
• Type of Assets-Vulnerabilities vs Risk
Criteria Matrix: This matrix allows us to
associate the type of assets and
vulnerabilities of an enterprise with respect
to the risk criteria that we have defined. In
the current schema, 345 relationships have
been defined for this matrix
3.1.3 Phase III: Creation of the ISMS
Object Schema
This phase defines the library of objects of which the
ISMS is composed. It also defines their properties.
Each of the defined objects has a set of additional
associated properties (periodicity, etc) which will be
useful for dynamically recalculating the level of
fulfillment of controls.
The objects defined in this phase have an
associated set of properties (a schema, a section and
a version). The current schema is formed of an
object library composed of the following set: 50
procedures, 4 technical instructions, 25 regulations
files, 67 patterns and 36 registers.
Each of the defined objects has had two
temporality values assigned to it:
• Estimated periodicity: This represents an
estimation of the time in which an object
must be used at least once. When the
estimated periodicity is exceeded, the
system will punish the current level of
fulfillment of the controls associated with
that object, decreasing them according to an
estimated percentage.
• Compulsory Periodicity: The object can
have this temporality value defined or not.
This represents the period of time in which
the object must be compulsory executed at
least once. When the compulsory
periodicity is exceeded, the system will
punish the current level of fulfillment of
controls associated with that object
decreasing them according to an estimated
percentage.
The periodicities defined in the objects, together
with the complaint process, the periodical audits and
the metrics are in charge of dynamically revaluating
the state and evolution of the system.
In the current version of this application, we
have taken into consideration two special types of
objects (regulations and procedures):
• Regulations: There is a set of regulations
with which the enterprise must comply.
Each regulation is associated with the
controls through a matrix. This allows the
updatedness of the value of fulfillment of
them when an unfulfillment of a regulation
is detected. In the current schema there are
264.
• Procedures: Procedures may be carried out
by a set of users from the enterprise
according to the profiles that they have
been assigned. Each of these procedures
has been assigned a set of phases through
which users must pass in order to be able to
fulfill the procedure. The current schema is
composed of 50 procedures with a total of
609 phases with 697 possible execution
paths. Each one of the phases of the
procedure has a set of profiles associated
with users that are in charge of approving
the phases to allow that the procedure
initiates a new phase assigned to it.
3.2 ISMS Generation
When a consultant aims to generate an ISMS for an
enterprise by using the application and methodology
that we have developed, he/she could do so in a
minimum period of time and with minimum cost. To
do this, he/she must pass through three phases in
which a minimum of necessary information from
both the selected schema and the algorithms defined
in the application must be introduced, in order for
the system to generate an ISMS which is adequate
for the enterprise.
3.2.1 Maturity Level Establishment
This is the initial phase and it will require more
information than the rest of phases due to the fact
that it is necessary to define the enterprise profile
(the enterprise’s data and the valoration of the
defined parameters) and the enterprise’s current
security level (through a checklist composed of 735
questions based on ISO/IEC 17799:2000).
As a result of this phase, a percentage of
fulfillment of each control for each maturity level of
the selected model will be achieved, together with
the level which it is desirable to reach. If we have
security controls over the current security level and
the desirable security level, they will be taken into
account at the time of the ISMS generation at phase
SCMM-TOOL - Tool for Computer Automation of the Information Security Management Systems
315