Information Security, Ethical Hacking, website Security, Database Security, IT Audit and Compliance, Security news, Programming, Linux and Security.
Tuesday, 30 July 2013
Today’s Security Organizational Structure
There is no “one size fits all” for the structure of the information
security department or assignment of the scope of the responsibilities.
Where the security organization should report has also been evolving. In
many organizations, the information systems security officer (ISSO) or
chief information security officer (CISO) still reports to the chief
information officer (CIO) or the individual responsible for the IT
activities of the organization. This is due to the fact that many
organizations still view the information security function as an IT
problem and not a core business issue. Alternatively, the rationale for
this may be the necessity to communicate in a technical language, which
is understood by IT professionals and not typically well understood by
business professionals. Regardless of the rationale for placement within
the organization, locating the individual responsible for information
security within the IT organization could represent a conflict of
interest, as the IT department is motivated to deliver projects on time,
within budget and at a high quality. Shortcuts may be taken on security
requirements to meet these constraints if the security function is
reporting to the individual making these operational decisions. The
benefit of having the security function report to the CIO is that the
security department is more likely to be engaged in the activities of
the IT department and be aware of the upcoming initiatives and security
challenges. A growing trend is for the security function to be treated
as a risk-management function and as such, be located outside of the IT
organization. This provides a greater degree of independence, as well as
providing the focus on risk management vs. management of user IDs,
password resets, and access authorization. Having the reporting
relationship outside of the IT organization also introduces a different
set of checks and balances for the security activities that are expected
to be performed. The security function may report to the chief
operating officer, CEO, general counsel, internal audit, legal,
compliance, administrative services or some other function outside of
IT. The function should report as high in the organization as possible,
preferably to an executive-level individual. This reporting line ensures
that the proper message about the importance of the function is
conveyed to senior management, company employees see the authority of
the department, and that funding decisions are made while considering
the needs across the company.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment