Roles, Responsibilities, and Accountabilities

Change is not an easy process for IT organizations, especially when that change pertains to the security of IT infrastructure components and deals with end users. Implementing change and getting acceptance or buy-in for the roles, responsibilities, and accountabilities for information security is paramount. This is critical because of the separation of duties, given the seven areas of information security responsibility. This separation of duties is the result of a defense-in-depth approach to securing the IT infrastructure, where the duties, tasks, roles, responsibilities, and accountabilities are distributed in a layered fashion across the organization. Security controls, procedures, and guidelines must be fully understood to mitigate risk.

The staffing and information security expertise that is needed to support the roles, tasks, responsibilities, and accountabilities throughout the IT infrastructure encompasses many areas in information technology. The seven areas of information security responsibility require full cooperation and understanding of each person's responsibilities and accountabilities in the information security chain of defense. Many organizations lack the experience and expertise in information security and are forced to either get the proper training or obtain assistance from consultants to fulfill the new roles, tasks, responsibilities, and accountabilities. To adequately address the information security requirements of an IT organization, specific expertise in the seven areas of information security responsibility is required:

Tip

Many organizations require information security staff augmentation or outsourced, managed security services because of a lack of qualified information security resources. Training internal employees in information security or hiring information security consultants is certainly one way to obtain some information security knowledge. This strategy coupled with outsourcing managed security services is commonplace given the complexity of information security. Today, many organizations outsource elements of their information security responsibilities to managed services providers who specialize in outsourced security monitoring and assessment services.

 

Seven Areas of Information Security Responsibility

Specific to these seven areas of information security responsibility are the following requirements for IT personnel regarding roles, tasks, responsibilities, and accountabilities:

User Area

Workstation Area

LAN Area

Remote Access Area

LAN-to-WAN Area

WAN Domain

Systems/Applications Domain

Many IT organizations are struggling to augment or educate their current IT staff in information security practices, procedures, and guidelines. Traditional IT job descriptions are being expanded to include the roles, tasks, responsibilities, and accountabilities unique for information security. In some cases, organizations are creating entire IT security departments within their existing IT organization. Other organizations put the IT security department outside of the IT organization and have them report directly to the chief security officer (CSO) and not the chief information officer (CIO). Training and certifying IT professionals in information security is paramount. Without the proper background, knowledge, and experience in information security, creation and implementation of an IT security architecture and framework is a difficult task. In addition, training the end users to be more security conscious is not an easy task and requires constant reminders and education to bring the security consciousness of the organization to a consistent level.

Категории