ITIL v5 Compass
Management Practices
Information Security Management

Information Security Management

Definition

"The practice of protecting the information needed by the organization to conduct its business."

Organizations must:

  • Develop and manage information security policies and plans
  • Mitigate information security risks
  • Exercise and test security plans
  • Embed information security across the service value system
⚠️

Key principle: Security responsibility extends across the entire organization, not isolated to security teams alone. ITIL v5 emphasizes integrating protections throughout all value chain activities and management practices.

The CIA Triad and Beyond

PrincipleDefinition
ConfidentialityPrevention of information being disclosed to unauthorized entities
IntegrityAssurance that information is accurate and can only be modified by authorized personnel
AvailabilityEnsuring information can be used when needed
AuthenticationVerification that a characteristic or attribute which appears or is claimed to be true, is in fact true
Non-repudiationProviding undeniable proof that an alleged event happened, or an alleged action was performed

Processes

Information Security Planning and Implementation

  1. Analyze organization's strategy and context
  2. Define and agree the information security policies
  3. Conduct information security risk assessment
  4. Define and agree information security controls and plans
  5. Communicate policies and implement controls

Information Security Controls Tests and Exercises

  1. Plan tests and exercises
  2. Prepare tests and exercises
  3. Perform tests and exercises
  4. Review tests and exercises

Information Security Incident Management

  1. Detect and assign
  2. Triage and analyse
  3. Contain and recover

Information Security Assessment and Review

  1. Identify changes to business, technology, or threat environment
  2. Identify missing controls
  3. Assess control effectiveness
  4. Create assessment report

Key Terms

Threat: "any potential event that could have a negative impact on an asset."

Threat actor: "any person or organization that poses a threat."

Vulnerability: "any weakness in an asset or control that could be exploited by a threat."

Recommendations for Practice Success

  • Make information security everyone's responsibility, not just the security team's
  • Work closely with customers and partners to align security expectations
  • Assess risks and tailor policies to the organization's specific context and risk appetite
  • Automate anomaly detection and build resilience into systems and processes

Key Metrics

MetricWhat it measures
Products/services with documented security requirements (%)Coverage of security requirements
Products/services with security plans (%)Planning maturity
Timely updates of security plansResponsiveness to change
Security risks analysed and evaluatedThoroughness of risk assessment
Security risks mitigated to acceptable levelsEffectiveness of risk treatment
Security plans testedTesting coverage
Improvement actions from plan testingLearning from exercises
Governing body discussion of securityExecutive attention and oversight
Value streams with defined security stepsIntegration of security in workflows
Practices with security in process flows/rolesEmbedding security across the organization

Key Roles

  • Chief Information Security Officer (CISO): Sets security strategy and policy at the organizational level
  • Information security manager: Coordinates day-to-day security operations and risk management

Software Tools

  • Security Information and Event Management (SIEM) tools
  • Workflow management and collaboration tools
  • Monitoring and event management tools
  • Analysis and reporting tools
  • Work planning and prioritization tools
  • Knowledge management tools, survey tools
  • Orchestration systems