📜 ⬆️ ⬇️

Do-It-Yourself: Automate Security Process Management

Use what is at hand, and do not look for something else ...
Phileas Fogg

In today's world, security is one of the fundamental factors for business development. This does not require unnecessary words! The topic of reflection here can only be the amount of investments that a business is willing to invest in building and maintaining an effective security system that guarantees protection against possible incidents.

pic1 This question does not have a simple solution - after all, to select the right business protection strategy, it is necessary to conduct a detailed analysis, clarify goals and choose the right approach to achieve them. As a rule, the best approach for medium and large companies will be the phased implementation of the security system: starting with protecting the most critical assets, gradually expanding the scope, including the lower priority ones. Big things start small, and to get a guarantee that the security system will develop in the right direction and reach the required level of maturity by a certain date, you need to pay special attention to the processes themselves, designed to protect the company. Such processes include incident management, risk management, continuity management, access control, change control, and many others. If the company pays enough attention to the correctness of the execution of such processes, then the project to build a security system is almost doomed to success.
')
To ensure the correct execution of these processes they need to be managed. Management consists of planning, monitoring, evaluating performance, adequate support and modifications, if such a need arises. In this activity, a very important point is the interaction of people, which consists in the collection, processing, analysis of information, as well as its exchange with process implementers and other interested parties. It occupies the largest part of the process management activities.
pic2 For medium-sized (and especially large companies), even with the initially small area of ​​security system implementation, this represents a considerable amount of work: meetings, interviews, recording the information received, analyzing data, developing strategies and corrective measures, developing plans, monitoring activities and managing tasks the implementation of security systems and processes. A large amount of work in this area always determines a large amount of information.

Here the question arises: how to ensure effective work with a large amount of information?
pic3
Of course, responsible employees should be trained in effective analysis techniques, focusing on learning and using best practices in process management. Here, the following solution also seems obvious: automating the processes of collecting, analyzing and interacting, creating a common information field for all participants in the processes.

To implement the latter solution, it is necessary to use (and before that - create) a special information system that:
  1. provide information sharing with users of such a system
  2. automates work with information

The information system itself is not a panacea! The main work (collection, analysis, decision-making) is done by a person, provided that he has the right tool, and his time is not taken by long searches for necessary data, by copying them from one application to another, etc.
pic4
A person equipped with a specialized system has access to a common information field, which contains all the necessary information and allows you to effectively interact with other employees. In such a context, Excel tablets and Word documents do not seem to be an acceptable option.
When choosing the necessary information system, it is always necessary to make the following decision: which system is best to choose in order to guarantee the achievement of the goals set? In this case, the goal is effective management of information security processes.

Usually there are such options:

In our market there are many companies with different goals and opportunities, but very often for large and medium-sized companies the most cost-effective approach is to build and fully utilize their own system and then increase its functionality.

In my company, I have chosen for many years successfully used MS SharePoint to build a security management system.

There were such obvious prerequisites for this:

• Web-based interface is easy and clear.
• This system is already familiar and actively used by all employees.
• Easy access control
• Availability of additional components for granular access control.
• Rich functionality:

• Ability to easily integrate the system being developed with existing business process management systems based on a single information platform
• Development flexibility:

• Minimum investment

Integration of security processes with business processes is a very important point. Such integration in the framework of one information system provides another additional and, of course, a very important advantage - a portal common for the whole enterprise to exchange important production information. The list of assets of the company, employees, departments, analyzed problems, as a rule, already exists in the system, therefore, it is not necessary to spend additional resources to add functionality for managing such information.

pic6
As a result, with minimal investment, a full-fledged Infopulse Corporate Security Management System tool was built to manage such processes:

The system implements a single information field that covers the processes, systems and related data as part of enterprise security management, and also allows you to centrally document and monitor the current status of all important components of the security system.
The convenience of everyday work with a hand-built tool prompted in me a desire to share experience using the above reasoning. I hope they will be useful for my colleagues in the field of information security.

Source: https://habr.com/ru/post/142422/


All Articles