By
Hank Marquis
The IT Infrastructure Library® (ITIL®)
is best practice. We all know ITIL describes what to do, not how to do it.
The descriptive nature of ITIL leads many to wonder what benefits ITIL
delivers, if any.
However, without too much thought,
anyone familiar with a particular industry or IT segment can soon understand
how ITIL best practices can assist virtually any operational aspect of IT.
Let’s examine security for example. How
can ITIL best practices help with the day to day workings of security?
The ITIL has a dedicated book for security,
and includes security as a fabric within which the Service Support and Service
Delivery books operate. The ITIL focuses on the process of implementing security
requirements identified in Service Level Agreements.
However, as always, the ITIL is
descriptive and not prescriptive. Following, I show at least 11 ways ITIL
can improve or assist in security, and give you a 9-step plan for improving
security using ITIL.
Security and ITIL
ITIL describes a Security Management
function (e.g., a group, like Service Desk) that interfaces with other ITIL
processes regarding security issues. These issues relate predominantly to
the Confidentiality, Integrity and Availability of data, as well as the
security of hardware and software components, documentation and procedures.
Virtually every organization faces some
form of oversight and regulation. We have all heard of Sarbanes-Oxley, but
there are many, many more. HIPAA, FISMA, GLBA, COBIT, NIST 800-53/FIPS200,
FFIEC, and others.
There are at least five areas to
consider with thinking about security and ITIL:
- The process of security
management
- The relationships between
security and the other ITIL processes
- External relationships as
defined in Underpinning Contracts (UCs)
- Customer facing requirements as
defined in Service Level Agreements (SLAs)
- Internal relationships between
functional organizations as defined in Operating Level Agreements
(OLA's)
Here are some easy ways the best
practices in ITIL can improve how IT organizations implement and manage
information security in response to regulations.
- Security requires audits, and
regardless of the regulatory environment, IT must support audits.
Audits require documentation, process control, and clear roles,
responsibilities, and authorities. ITIL processes descriptions
provide the basis for sound audits.
- Security requires control over
assets. To control assets you must know what you have, where it’s
located, and who can access it. This basis comes directly from ITIL
Configuration Management.
- Most regulation, including
HIPAA and SOX, requires analysis and documentation of changes made
to IT systems. In change management many issues are to be ensured.
Change Management can perform risk analysis, business impact
analysis, and security analysis from a centralized perspective.
- Security management requires an
incident category specifically for security related incidents. The
ITIL Incident Management process provides the control and
flexibility required to manage security incidents quickly and
efficiently without a duplicate organization.
- Security Incidents require
review by security management. Having a single point of contact for
all matters relating to IT – the ITIL Service Desk – provides a
single reporting source for all Incidents, including those
pertaining to security.
- ITIL focuses security where
needed based on business requirements, not technology. This is
important since most security operations today do what they feel is
best for the business instead of just what the business required.
This “gold plating” carries a high cost and keeps IT from being seen
by the business as a partner.
- Since ITIL is all about
organizational best practices, the security management process
itself can operate in a process-driven, methodical manner. This is
absolutely critical to success with security.
- ITIL requires continuous
review, audit, and reporting of processes activities. Security
requires continuous reviews to remain vigilant.
- Availability Management
describes a centralized engineering and architecture that always
takes into account the Confidentiality, Integrity, and Availability
of data (CIA).
- The Service Level Management
process sets up, monitors, reports on, and administers agreements
with customers (SLA), suppliers (UC), and other IT functional
departments (OLA). These contracts and agreements all require
security sections.
- Establish a link between
Problem Management and security alert channels. Relevant security
issues should be documented and added to the knowledge base for use
by Incident Management and the service desk as well as other IT
functional groups.
Summary
ITIL best practices help deliver real
security improvements, as well as establishing the controls required for
meeting legislative and regulatory requirements.
Here is a simple 9 step plan for
improving security using ITIL:
- Work with customers and the
business to understand and document security requirements. It is
very important that you take your lead from the business.
- Review with senior IT leaders
to ensure review of all relevant legislative, industry, and
corporate regulations.
- Work with other ITIL process
managers to validate the ability to support customer (#1 above) and
corporate (#2 above) security requirements identified.
- Negotiate a Service Level
Agreement (SLA) that includes a security section. As always, keep
it in business terms, and make sure it is measurable.
- Based on the SLA(s), create and
implement Operational Level Agreements (OLAs) between related
technical or functional departments or groups. Each OLA requires a
security section that clearly spells out and defines how, for
example, security incidents will be handled.
- Review all Underpinning
Contracts (UCs) for security as well. They should all include a
security section. For example, defining access to customer
information and data confidentiality.
- Update UCs, define and
implement OLA's, then publish the SLA.
- Report on security as you would
report on capacity, availability, or changes.
- As required, iterate the
security sections as required.
--
Where to go from here:
- Subscribe to our newsletter and get
new skills delivered right to your Inbox,
click here.
- Download this article in PDF format
for use at your own convenience, click here.
- Browse
back-issues of the DITY Newsletter, click here.
|