Sunteți pe pagina 1din 2

SUGGESTED ROLES AND RESPONSIBILITIES OF CISO

To effectively perform his/her duties it is 8. Define risk management framework. 5. Ensure that information security
recommended that CISO should possess the 9. Define information security measurement considerations are integrated with IT
following: metrics and other key performance indica- system planning, development / ac-
(a) Management capabilities ; tors. quisition life cycle.
(b) Strategic planning abilities 10. Get approval for information security plan, 6. Periodically evaluate and review effec-
(c) Knowledge of relevant legislative or budget and resources from top manage- tiveness of information security poli-
regulatory requirements such as IT ment. cies, procedures, standards, guide-
Act and associated Rules and Policy Planning line and processes, ISMS etc.
(d) Some competence/exposure in the Suggested responsibilities under this role are: 7. Issue alerts and advisories with re-
field of information security; 1. Identify information security polices, stan- spect to new vulnerabilities / threats
(e) Good communication and writing dards, procedures, guidelines and proc- to all concerned.
skills. esses 8. Perform risk assessment steps like:
CISO’s roles and responsibilities may 2. Define formal process for creating, docu- (a) identify and make inventory of
include but not limited to the following: menting, reviewing, updating, and imple- assets within the scope of informa-
Strategic Planning menting security policies. tion security plan; (b) identify and
3. Define information security policy. document threats to those assets; (c)
Suggested responsibilities under this role
perform vulnerability analysis; (d)
are: 4. Define policy for classification of informa-
perform impact analysis; (e) evaluate
1. Seek top management support and tion and information as sets.
level of risk; (f) determine acceptabil-
direction for implementing informa- 5. Lead and coordinate development of or- ity or treatment of risk based on risk
tion security measures in the organi- ganization specific information security acceptance criteria.
zation. policies, procedures, guideline and proc-
9. Perform risk treatment like: (a) Iden-
2. Identify information security goals esses in consultation with various stake
tify appropriate controls for treatment
and objectives consistent with or- holders including NCIIPC.
of risk ; (b) take approval from senior
ganization business need/objectives 6. Get approval of information security poli- management for implementation of
3. Define the scope and boundaries of cies, procedures, guidelines and processes. identified security controls; (c) over-
the information security program. Information Security Management see implementation of information
4. Understand legal and regulatory re- Responsibilities under this role are: security controls; (d) evaluate resid-
quirement. 1. Assist in developing, maintaining, review- ual risk; (e) take approval from senior
5. Define information security imple- ing and improving strategic organization- management for residual risk.
mentation strategies. wide information security and risk manage- 10. Implement automated and continu-
6. Estimate budget and resources re- ment plan. ous monitoring of security incidents.
quired. 2. Disseminate information security policies, 11. Maintain a record of information se-
7. Plan and establish organization-wide procedures and guideline to all concerned. curity incidents and breaches.
Information security Management 3. Enforce implementation of approved infor- 12. Take remedial action to reduce / di-
System (ISMS) in accordance with mation security policies, procedures, guide- minish the impact of information se-
ISO/IEC 27001 Standard, directions line and ISMS etc. curity incidents and breaches.
and advice of NCIIPC and other rele- 4. Integrate information security procedures 13. Share management approval report
vant security standards. with organization's business processes. on information security and breaches
with NCIIPC computing devices/storage media when
NATIONAL CRITICAL
14. Ensure compliance with legal and they are taken outside of the organiza-
INFORMATION INFRASTRUCTURE
regulatory requirements for informa- tion.
PROTECTION CENTRE
tion security. 5. Ensure all information systems with
15. Raise information security awareness organization are adequately patched
among management, employees, con- and updated.
tractors and other stake holders. Information Security Auditing
16. Provide role based training on infor- Suggested responsibilities under this role
mation security to the workforce. are:
17. Evaluate effectiveness of training & 1. Periodically evaluate and review effec-
awareness program and continuously tiveness of Information Security Man-
upgrade it. agement System.
18. Coordinate and lead in implementa- 2. Evaluate compliance with respect to
tion of ‘Business Continuity Plan legal and regulatory requirement for
(BCP)’. information security.
19. Periodically conduct mock drill to 3. Evaluate compliance with respect to
evaluate effectiveness of business con- organization specific information secu-
tinuity plan. rity policies, procedures, standards, Roles and Responsibilities
20. Define and implement change man- guidelines and directives & advice of of Chief Information
agement plan for both the change in NCIIPC.
information systems and the change 4. Perform information security audit at
Security Officers (CISOs)
in ISMS itself. least annually or whenever significant of Critical Sectors in India
21. Ensure compliance of information se- changes have been made in IT systems/
curity by contractors/suppliers etc. Infrastructure.
Other responsibilities may include: 5. Prepare information security audit re-
1. Ensure that before issuing NOC (No port along with recommendations for
Objection Certificate) to the employee, improving information security.
who has resigned or has been termi- 6. Obtain senior management approval of
nated or is leaving organization, all information security audit report.
equipments have been taken back and 7. Send a copy of management approved
all his accounts either have been de- audit report periodically to NCIIPC.
leted or their passwords have been
changed.
2. Maintain an information and commu-
nication technology (ICT) as set regis-
ter containing details of asset, its
National Critical Information
owner and its security classification.
Infrastructure Protection Centre.
3. Ensure that all storage media, when
no longer required, are disposed secu-
rity and safely as per laid down proce- Block No. 3 Old JNU Campus, New Delhi 110067
dures. Toll Free No.: 1800-11-4430 2015
Email: helpdesk1@nciipc.gov.in;
4. Ensure safety and security of portable helpdesk2@nciipc.gov.in

S-ar putea să vă placă și