Information Security Blog

ISMS Interdependence: Risk Assessment, Incident Response and Business Continuity Plans

ISMS Interdependence: Risk Assessment, Incident Response and Business Continuity Plans

4 Flares

4 Flares


×

One of our ISO 27001 clients in the legal vertical recently asked Pivot Point Security to perform a gap assessment of their Incident Response Plan. They were a little surprised when we asked for their most recent risk assessment and Business Continuity Plan.

I often say, “Information Security controls are often hierarchical and interdependent in nature.” Here are two examples that illustrate this:

  • When looking at an Incident Response Plan (IRP), it is important to consider the Risk Assessment, because you can’t gauge the IRP’s effectiveness without understanding the scope and boundaries of the Information Security Management System (ISMS) and the requirements for legal compliance and evidence of due diligence.
  • Similarly, when evaluating an IRP it’s also important to consider the Business Continuity Plan, as the IRP’s effectiveness relates to the Business Continuity Management System requirements. It is critical to understand this relationship, as it is often during the Incident Response process (e.g., the analysis phase) that the Business Continuity Plan (BCP) gets “triggered.”

It actually got a little more interesting in this case, as their BCP wasn’t “really” a BCP per se.  We view a well-executed BCP as having two parts: 1) An IT Continuity component, often referred to as an IT Continuity Plan or a Disaster Recovery Plan (DRP), and 2) A Business Continuity component.  The first defines the requirement for and drives the recovery of the computing infrastructure, while the latter defines the requirements for and drives the recovery of the personnel and processes that operate the business.  With both in place, the business can recover.

In this case the BCP was really more a DRP, and our review of the IRP ended up identifying this “out of scope gap.”  Which – although not technically part of their IRP – would have made it far less effective.

Another ISO 27001 client’s “Hurricane Sandy” experience also illustrates this interdependence well.  When investigating their data center’s switchover to emergency power, they learned that flooding had crippled the building’s power and connectivity.  Their Incident Response Plan then triggered their Disaster Recovery Plan and they “failed” their critical IT infrastructure over to their DR vendor.  When they realized that the building/offices would be “closed” for some period of time the IRP/DRP triggered their Business Continuity Plan.  Critical services were shifted to other offices, their emergency DR site, and home based operations.  The process was painful and it didn’t work perfectly – but they did recover and did not sustain significant business impact.  The Continuous Improvement elements of ISO 27001 require that organizations learn from incidents – so most of the rough edges of their Incident Response, Disaster Recovery, and Business Continuity have now been smoothed out.

So if you’re looking at your BCP or DRP or IRP (ain’t acronyms wonderful (AAW)?) – make sure you look at them in a holistic fashion.

 

 

 

 

 

 

 

0


Free Whitepaper: Five Best Practices for SIEM

siem-whitepaper

The promise of SIEM is the consolidation of all relevant Security Event Logs from disparate sources into a single unified and normalized data store.

Free Download: A Best Practices Guide to Database Security

database security roadmap

Because data is only as secure as the systems & processes it relies on – a holistic approach to data security is essential. This roadmap is not meant to be exhaustive but rather to stimulate the necessary thought process to put you on the path to good data security.

Best Practices for Firing A Network Security Administrator

Firing A Network Security AdministratorWant to know how to fire a Network Admin? Need to know what precautions to take? Firing any employee can be a stressful event. Firing one who has significant knowledge of and privileged access to your Information Technology/Security infrastructure is even more stressful, as the risks are so notable.

Free Whitepaper: Stop Wasting Money on Penetration Testing

penetration-testing-whitepaper

Penetration Testing is most frequently performed to:

  • Substantiate the net effectiveness of a mature control environment
  • Prove to a third party that an environment is secure/trustworthy
  • Quickly assess the security of a less mature control environment (in a sense a technical risk assessment)
  • To validate that significant changes did not have unanticipated results

Is ISO 27001 Right for (Y)our Organization?

iso-27001-webinar

Thinking about ISO 27001 Certification? View our free On-Demand ISO 27001 Webinar

  • How to deal with increasing threats
  • How to manage multiple regulatory requirements
  • How to handle client requests for attestation
  • To validate that significant changes did not have unanticipated results

Free Download: ISO 27001 Vendor Selection Toolkit

“ISOOur ISO 27001 Toolkit will help you to select an ISO 27001 consulting firm.
  • Review the Issues Critical to Your Environment
  • "Vet" Vendor Qualifications
  • Compare the Top 3 Vendors
  • Sample RFP Included

Free Download: ISO 27001 Implementation Roadmap

ISO 27001 RoadmapHave no fear – our “roadmap” will guide you, step by step, through the entire ISO 27001 process.

Getting to ISO 27001 certification is a process made up of things you already know – and things you may already be doing!

Download: Information Security Attestation Guide

Information Security GuideA Best-Practices Guide to Information Security Attestation

Download our proven Information Security Guide to simplify the process of protecting your data, proving you’re secure and growing your business.

About the Author:

John Verry (CISA, 27001 Certified Lead Auditor, CCSE, CRISC) is Pivot Point's resident "Security Sherpa". He is lucky enough to spend most of his day helping clients develop a road map to address security, compliance, and attestation requirements.

Add a Comment

4 Flares Twitter 2 Facebook 0 Google+ 0 Pin It Share 0 LinkedIn 2 Reddit 0 StumbleUpon 0 Email -- 4 Flares ×