Security Basics mailing list archives
ISM3 v1.20 published, a standard for advanced information security management
From: aceituno () yahoo com
Date: 4 Apr 2006 11:23:03 -0000
The publication of ISM3 v1.20 (Information Security Management Maturity Model, pronounced ISM cubed) offers many advantages for information security management systems. ISM3 can be used standalone or enhance systems based on ITIL, ISO27001 or Cobit. The principal approach of ISM3 is based on Achievable Security rather than Absolute Security. By achievable security, ISM3 intends that the objective of Information Security should ensure the realization of business objectives. The traditional view that Information Security is to prevent attacks is not realistic. ISM3 achieves this by mapping the business objectives (e.g. deliver products on time) of an organization directly to security objectives (e.g. ensure database access only to authorized users). The significant features of ISM3 are: *Metrics for Information Security - What you can't measure, you can't manage, and what you can't manage, you can't improve - ISM3 v1.20 makes information security a measurable process by using metrics for every process, making it probably the first information security standard to do so. This allows for a continuous improvement of the processes, as there are criterion to measure the efficiency and performance of the information security management system. *Maturity Levels - With this standard it is possible to create ISMS (Information Security Management Systems) for small and big organizations. ISM3 has 5 maturity levels, each level tailored to the security objectives of the organization and available resources. This makes it a standard for small organizations to behemoths. *Process Based - ISM3 v1.20 is process based, which makes it especially attractive for organizations familiar with ISO9001 or those that use ITIL for as the IT management model. Using ISM3 fosters the collaboration between information security clients and providers, as the outsourcing of security processes is enable by explicit mechanisms for outsourcing. *Adopts best practices - ISM3 implementation enjoys of advantages like the extensive reference to established standards for every process, and the explicit distribution of responsibilities in the organization between leaders, managers and technical personnel using the concept of Strategic, Tactical and Operational Management for Information Security. *Accreditation - ISMS based in ISM3 are Accreditable under ISO9001 or ISO27001 schemes, which means that you can use ISM3 to implement an ISO 27001 based ISMS. This will be attractive as well to organizations that are already quality certified and have experience and infrastructure for ISO9001. *Business Friendly A key advantage of using ISM3 for ISMS is that Senior Managers and Stake Holders are able to clearly see Information Security as a business investment and measure ROSI ( Return on Security Investment). ISM3 v1.20 is freely downloadable from www.ism3.com. --------------------------------------------------------------------------- EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE The Norwich University program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Tailor your education to your own professional goals with degree customizations including Emergency Management, Business Continuity Planning, Computer Emergency Response Teams, and Digital Investigations. http://www.msia.norwich.edu/secfocus ---------------------------------------------------------------------------
Current thread:
- ISM3 v1.20 published, a standard for advanced information security management aceituno (Apr 04)
