Security Function

Kindly be reminded that the recommended answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications. 

This post is the justification of the Information Security Governance Practice Question. The recommended answer is B, The role and responsibility (R&R) of CISO.

This question is designed based on the Topic 1.2 (Evaluate and apply security governance principles) in Domain 1 of the CISSP exam outline.


Information Security is an emerging discipline and the CSO or CISO role enlisted in the senior management team is a trend. However, the title or name of security function doesn’t necessarily determine the role and responsibility (R&R) well. One may be appointed as a CISO, while he or she is practically authorized to do things just like a middle information security manager. That’s why R&R is the first and most concern for a CISO to get things rolling.

A strategy is an approach or a high-level plan, usually prepared or developed by senior management. Strategy management divides into two parts: strategy development(formulation) and strategy implementation(execution). It’s impossible to implement a strategy (through an information security program) without its existence or before it is developed.

Information security strategy should align with business goals and corporate or business strategy; it comprises the (future) desired state, current state, and a roadmap with resource and constraint considerations to fill the gap between the desired and current state.

An information security program is a means to implement the information security strategy. A program-specific policy is usually developed to support the associated information security program.

The business mission/vision, goals, and upper-level strategy should be reviewed, and the business and security requirements should be elicited to develop an information security strategy and ensure strategic alignment.

The following is a generic reference process:

  1. Clarify and confirm R&R; communicate to redefine or modify it if necessary
  2. Review business mission/vision, goals and upper-level strategy, and elicit business and security requirements
  3. Develop an InfoSec strategy (Answer D is lack of a strategy)
  4. Implement the InfoSec strategy (through InfoSec program and policies)

 

 

2 thoughts on “Security Function

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s