2.2 CA 2: ES Governance
Enterprise security governance directs and controls
an organization to establish and maintain a culture of
security throughout the enterprise (Allen, 2005a).
The goal of enterprise security governance is to
define adequate security for the organization in
relation to all the organizational components that
affect the achievement of the organizational CSFs.
In this regard critical success factors guide enterprise
security governance by identifying the crucial
components of an organization. By using CSFs as a
guideline, the executive manager can identify
responsibilities and judge the importance of each
organizational department in achieving CSFs
(Caralli, 2004a). A CSF such as development of
human resources is dependant upon the human
resource department, while a CSF such as strategic
planning is the responsibility of both financial and
sales departments.
Management at all levels of the organization must
place value on and show the importance of security
(McCarthy, 2003). Security governance helps the
business with security, providing sponsorship and
governance for enterprise security, and creating a
focus on the productive elements, processes and
information, critical to its survival (Caralli, 2004b).
Security governance provides knowledge at all
levels of management and provides awareness of the
various security controls available, and
implementation best practice (Straub & Welke,
1998).
2.3 CA 3: Risk Management
Once all levels of management have been coached
on the security requirements, they can begin to
sponsor and commit the efforts to risk management.
The organizational CSFs can be utilized to
determine the scope of the risk assessment and risk
analysis activities (Caralli, 2004a). This can be done
through using evaluation criteria such as
Operationally Critical Threat, Asset, and
Vulnerability Evaluation (OCTAVE).
OCTAVE is a self-directed evaluation approach
focusing on risk to information assets, mitigation
procedures and practices, and constant monitoring of
the security practices. It involves all departments of
the enterprise (Alberts & Dorofee, 2002). Applying
CSFs to existing information security evaluation
criteria, such as OCTAVE, ensures that risk
assessment is focused on the right areas of the
organization (Caralli & Stevens, 2004) and ensures
the phases of OCTAVE yield meaningful results;
building asset-based profiles, identifying
vulnerabilities and threats, and developing security
strategy and plans (Alberts et al, 2001).
Once the critical assets have been identified, the
security requirements for each asset can be
determined. These security requirements should
place emphasis on the aforementioned security
goals. Based on the role of identified assets in
achieving organizational goals and mission, and the
boundaries of adequate security, certain security
requirements might be prioritized over others. For
instance, an ERP system might require availability,
accountability, and integrity while a financial system
would prioritize confidentiality and privacy over
availability, while other parameters remain the same
(Caralli, 2004a).
A risk mitigation framework, such as OCTAVE,
may focus security on operational areas that employ
a tactical and strategic approach (Alberts et al,
2001).. Best practices, such as that offered in ISO
17799, focus on standards that the enterprise is
required to fulfill, and provides a checklist the
organization should accomplish; what they must do
but not how to do it (Saint-Germain, 2005). CSFs
become the evaluation criteria upon which to
measure the risk mitigation strategies identified by
OCTAVE and whether best practices have been
followed that fulfill the security needs. It is argued
the CSFs tie the risk mitigation strategies and best
practices together, for each asset and for each
department, into a unified enterprise perspective
making CSFs crucial in achieving objective and
goals (Caralli, 2004a).
2.4 CA 4: IT Ops
After performing risk mitigation, the organization
proceeds to create procedures, standards, controls,
and policies which allow them to mitigate the risk to
the critical assets they have identified. The
procedures, standards, controls, and policies that the
enterprise creates must reflect the business
objectives, be consistent with the organizational
culture, and have the support and commitment by all
levels of management (Alberts & Dorofee, 2001;
Caralli, 2004b). CSFs assist the process of creating
the strategic security measures by becoming the
foundation on which those measures are based
(Allen, 2005a; Caralli, 2004b). CSFs focus and align
the different security measures with the
organizational CSFs, therefore ensuring each
ICEIS 2007 - International Conference on Enterprise Information Systems
378