Accountability for Information Security Roles and Responsibilities, Part 1

In recent years, information security has evolved from its traditional orientation, focused mainly on technology, to become part of the organization’s strategic alignment, enhancing the need for an aligned business/information security policy. 1 , 2 Information security is an important part of organizations since there is a great deal of information to protect, and it becomes important for the long-term competitiveness and survival of organizations. Thus, the information security roles are defined by the security they provide to the organizations and must be able to understand the value proposition of security initiatives, which leads to better operational responses regarding security threats. 3

Organizations and their information storage infrastructures are vulnerable to cyberattacks and other threats. 4 Many of these attacks are highly sophisticated and designed to steal confidential information. Therefore, enterprises that deal with a lot of sensitive information should be prepared for these threats because information is one of an organization’s most valuable assets, and having the right information at the right time can lead to greater profitability. 5 Enterprises are increasingly recognizing information and related technologies as critical business assets that need to be governed and managed in effective ways. 6

Information security is a business enabler that is directly connected to stakeholder trust, either by addressing business risk or by creating value for enterprises, such as a competitive advantage. 7 Moreover, information security plays a key role in an organization’s daily operations because the integrity and confidentiality of its information must be ensured and available to those who need it. 8

These enterprises, in particular enterprises with no external compliance requirements, will often use a general operational or financial team to house the main information security blueprint, which can cover technical, physical and personnel-related security and works quite successfully in many ways. 9

Nonetheless, organizations should have a single person (or team) responsible for information security—depending on the organization’s maturity level—taking control of information security policies and management. 10 This leads chief information security officers (CISOs) to take a central role in organizations, since not having someone in the organization who is accountable for information security increases the chances of a major security incident. 11

Some industries place greater emphasis on the CISO’s role than others, but once an organization gets to a certain size, the requirement for a dedicated information security officer becomes too critical to avoid, and not having one can result in a higher risk of data loss, external attacks and inefficient response plans. Moreover, an organization’s risk is not proportional to its size, so small enterprises may not have the same global footprint as large organizations; however, small and mid-sized organizations face nearly the same risk. 12

COBIT 5 for Information Security is a professional guide that helps enterprises implement information security functions. It can be instrumental in providing more detailed and more practical guidance for information security professionals, including the CISO role. 13 , 14

The Problem

COBIT 5 for Information Security helps security and IT professionals understand, use, implement and direct important information security activities. With this guidance, security and IT professionals can make more informed decisions, which can lead to more value creation for enterprises. 15

In particular, COBIT 5 for Information Security recommends a set of processes that are instrumental in guiding the CISO’s role and provides examples of information types that are common in an information security governance and management context. Furthermore, it provides a list of desirable characteristics for each information security professional.

However, COBIT 5 for Information Security does not provide a specific approach to define the CISO’s role. Such an approach would help to bridge the gap between the desired performance of CISOs and their current roles, increasing their effectiveness and completeness, which, in turn, would improve the maturity of information security in the organization.

Moreover, this framework does not provide insight on implementing the role of the CISO in organizations, such as what the CISO must do based on COBIT processes. It provides a “thinking approach and structure,” so users must think critically when using it to ensure the best use of COBIT.

Every organization has different processes, organizational structures and services provided. The CISO’s role is still very organization-specific, so it can be difficult to apply one framework to various enterprises. This difficulty occurs because it is complicated to align organizations’ processes, structures, goals or drivers to good practices of the framework that are based on processes, organizational structures or goals. The mapping of COBIT to the organization’s business processes is among the many challenges that arise when assessing an enterprise’s process maturity level.

COBIT 5 has all the roles well defined and responsible, accountable, consulted and informed (RACI) charts can be created for each process, but different organizations have different roles and levels of involvement in information security responsibility.

ArchiMate is the standard notation for the graphical modeling of enterprise architecture (EA). Many organizations recognize the value of these architectural models in understanding the dependencies between their people, processes, applications, data and hardware. Using ArchiMate helps organizations integrate their business and IT strategies.

The challenge to address is how an organization can implement the CISO’s role using COBIT 5 for Information Security in ArchiMate, a challenge that, by itself, raises other relevant questions regarding its implementations, such as: