When any of these are missing, tasks will be executed in an unsatisfactory way andbe supported by excuses: “Sorry, I did not have time to do the data backup for thiscritical system and the data is now lost”, or “Sorry, I did no do the test on thismodification as I was sure it would be OK” (guess what: it wasn’t).If the answer to this question is NO, the organisation has a management problemthat may require injections of motivation, training, and recruitment and, possibly,more drastic actions.4.3.4. Standards, guidelines and good practicesMany sets of standards and good practices for information security have beenproduced. These are the work of professional bodies, working groups of dedicatedpractitioners. As technologies change fast, none of these documents can be consideredto be “definitive”. Some of the items in the list that follows are widely accepted to beGood Enough:• The ISO 27000 family of standards for the management of informationsecurity: These documents are published by the International StandardsOrganisation, regularly reviewed and updated.• The NIST SP800 series of documents, published by the Computer SecurityDivision of the U.S. National Institute for Science and Technology. Consistingof well over hundred documents, these are also regularly updated.• Other relevant guidelines and good practices cover more specific segments ofthe practice of information security. Amongst them:• The Information Technology Infrastructure Library (ITIL) covers genericprocess descriptions. These aim to improve the consistency with whichprocesses are implemented and executed. ITIL is widely used around the worldand led to the development of the international standard ISO 20000 on I.T.Service Management.• The Control Objectives for Information Technology (COBIT), issued by theInformation Technology Governance Institute (ITGI) and the InformationSystems Audit and Control Association (ISACA). Its current scope coversgovernance, planning and organisation, acquisition and implementation, service
đang được dịch, vui lòng đợi..
