Sunteți pe pagina 1din 12

Kluge and Sambasivam Thu, Nov 6, 1:30 - 1:55, Pueblo C

Formal Information Security Standards


in German Medium Enterprises
David Kluge
David.Kluge@liverpool.ac.uk

Samuel Sambasivam
Computer Science Department
Azusa Pacific University
Azusa, CA 91702, USA
ssambasivam@apu.edu

Abstract
During the last ten years, the role of formal information security standards has gained
importance. In several ways, they can be helpful in achieving security of business informa-
tion systems. One of them is the provision of comprehensive collections of evaluation crite-
ria and security measures. Such can be the basis of a holistic security strategy in that they
can act as basis for security policies and auditing schemes. Large enterprises appear to
have determined security strategies and written security policies as a matter of course and
in most cases it can be anticipated that formal standards have been their origin. As for
firms from the medium size sector, this is less often the case. This paper deals with the
acceptance of formal standards among medium enterprises. We analyze their suitability
with respect to company size and discuss typical challenges to their implementation .
Keywords: Information Security, Medium Enterprises, Formal Standards, ISO 27001,
Suitability

their potential to aid with defining a con-


1. INTRODUCTION
sistent understanding of proper security
Given the growing dependence of enter- management techniques. They could help
prises on their corporate information sys- to establish rating scales and hence in-
tems, formal information security (IS) crease the measurability of corporate se-
standards have continued to gain atten- curity (Martins & Eloff 2001).
tion. Annual security surveys like the
When it comes to formal information secu-
Global Information Security Survey by
rity standards in medium enterprises, still
Ernst & Young (2006) demonstrate that
very few is known about their customari-
their use increased significantly during the
ness. When comparing the spread of in-
last years. According to the survey’s re-
formation security standards to the one of
sults, more than 70% of the interrogated
quality management (QA) standards by
organizations make use of internal audits,
the example of ISO standards, we can
and a third of them assessed their infor-
find, that the spread of ISO 27000 (IS) is
mation systems against formal standards.
significantly lower than for example the
This is a significant rise as compared to
one of ISO 9000 (QA) (ISMS 2008) (ISO
prior year’s results.
2000). As for the medium enterprises, this
There are various arguments suggesting picture seems to be even more intense
formal standards to be an effective tool to than for the large ones. Different explana-
use when starting over to develop a corpo- tions for this can be discussed including a
rate security strategy. One of them is,

Proc CONISAR 2008, v1 (Phoenix): §1533 (refereed)


c 2008 EDSIG, page 1
Kluge and Sambasivam Thu, Nov 6, 1:30 - 1:55, Pueblo C

lack of interest or acceptance as well as a similar to that of the Institute for Small
minor suitability. and Medium Enterprise research counting
all enterprises to the medium size sector
Nevertheless, when dealing with the secu-
which have more than 40 employees and
rity of business information systems, the
realize a revenue of more than 2 million
special conditions within the medium en-
Euros per year.
terprise sector should not be missed out.
In many European countries, medium en- 2.2 Considered Standards
terprises are of special importance to the
Several standards and frameworks are
domestic economy. In Germany for ex-
available in the field of information securi-
ample more than 90% of companies sub-
ty management. Subject to our compari-
ject to value added tax (VAT) belong to
son have been the ISO 27000 family, the
this sector and realize around half of all
Standard of Good Practice (SoGP) by the
annual turnovers (ISME 2004).
Information Security Forum and the IT
Barlette and Fomin studied the suitability Baseline Protection Manual by the German
of formal information security standards Federal Office for IT security. The Control
for small and medium enterprises based Objectives for Information and Related
on the existing literature. Since there are Technology (COBIT) as well as the IT In-
very few publications directly addressing frastructure Library (ITIL) are often men-
this topic, Barlette and Fomin explore the tioned in connection with IT security.
domain of quality assurance standards Though the outcome of their implementa-
instead and draw conclusions by analogy. tion supports a company in establishing
In contrast to their approach we try to secure information systems, their main
answer the adequacy question based on content deals with different matters, hence
practical experience using the case study they have not been counted as IS stan-
methodology. dards.
Barlette and Fomin come to the conclu- The ISO 27000 standard family clearly
sion, that small and medium enterprises plays an outstanding role in this realm. It
are not capable of adopting formal IS originates from the standards BS7799 and
standards at the present time. In our in- ISO17799 respectively which are found in
vestigation, we go into deeper detail and older literature likewise, so they some-
investigate which kind of standard re- times lead to confusion in conceptuality.
quirements present themselves as unat- The standard itself consists of a selection
tainable. This way we pave the foundation of so called “control objectives” and “con-
for decision making on whether a standard trols” each of which belongs to one of 13
adoption is still beneficial - at least part- sections representing a certain area of
wise or in a mitigated from. interest.
2. BACKGROUND
2.1 Characteristics of Medium-Sized
Companies
When talking about medium enterprises it
is vital to find a working definition of how
to classify them. Typically, there are two
main figures through which medium enter-
prises are characterized. The number of
employees being the first and the annual
turnover being the second one. The Euro-
pean Union defines a medium enterprise Figure 1: 11 Security domains of ISO 27001.
as a company having 50 to 249 employees Source: Ambi (n.d.)
and having an annual turnover of between ISO 27001 takes a “process approach” to
9 and 50 million Euros. Other institutions security . That is, instead of describing
like the German Institute for Small and security technology it defines operational
Medium enterprise research use a slightly procedures. These procedures are ex-
differing definition however. Aspects like pected to be filled out with technical
the private ownership and the company’s measures but the standard itself is not
legal status in which the entrepreneur very determined as to which these meas-
often has individual responsibility for the ures shall be.
success and failure of the venture play a
role (ISME 2004). We applied a definition

Proc CONISAR 2008, v1 (Phoenix): §1533 (refereed)


c 2008 EDSIG, page 2
Kluge and Sambasivam Thu, Nov 6, 1:30 - 1:55, Pueblo C

IT Baseline Protection is an initiative of the study research as methodology. Finally we


German Federal Office for Information used an online survey to poll key data
Security. The IT Baseline Protection Ma- from further enterprises in order to allow
nual consists of „standard security safe- for cross case replication of the case study
guards, implementation advice and aids for results.
numerous IT configurations which are typi-
Without giving a complete content wise
cally found in IT systems today (Grund-
comparison, it is evident that the men-
schutz 2004, p.1).“ Generally the purpose
tioned standards are similar in substance.
of this manual is similar to the one of ISO
It was not feasible to conduct a case study
27000. Nevertheless, IT Baseline protec-
on the suitability for each single standard,
tion distances itself from the existing ISO
therefore we chose to focus on ISO 27001.
standards arguing that these contained
The aforementioned fact, that the re-
hardly any concrete technical descriptions
mainder of the enumerated standards are
of how to establish security measures. IT
also intended to prepare for an ISO certifi-
Baseline Protection is an interpretation of
cation, implies that they do not reflect a
ISO 27001 and claims a higher degree of
generally different conception of informa-
management and regulation. Consequent-
tion security management. One might
ly the Baseline Protection catalogues are
therefore expect, that switching standards
comprehensive documents having a high
will not make a tremendous difference in
level of detail. Above all they are even
terms of achievability.
product specific and cover tasks like the
introduction of specific encryption 3.1. Case Study
schemes.
To discover possible difficulties that might
The Standard of Good Practice for Infor- hinder medium enterprises adopting ISO
mation Security is a work by the Informa- 27001, we accompanied a typical repre-
tion Security Forum. Its latest version has sentative from that sector in its adoption
been released in 2007 which makes it a efforts.
very current document. It shall provide a
„practical basis for assessing an organiza- To gather insights, we conducted an on
tion’s information security arrangements site audit and examined different sources
(SOGP 2007, p. 1)“. Unlike ISO 27000, of information from within the company.
the Standard of Good Practice is not that In common understanding, the goal of an
much process focused. It leverages both audit is to evaluate an organization which
organizational and technical measures is believed to be standard compliant al-
which are concrete to a medium level ready. In this picture, an audit is the fina-
meaning that they are more detailed than lization of an adoption process (NSAA
the code of practice corresponding to ISO 2001). Our approach was to go the other
27001 but wider than the IT Baseline cata- way around beginning with an initial audit
logues. The document reads itself very which expects not all evaluated control to
contiguous and it is a high level definition be fulfilled. It served as tool for assessing
which is open to all kinds of manufacturers the company’s ability to fulfill a control
and products but still makes explicit sug- rather than determining the state for now.
gestions of implementations and technolo- The currently existing policies and docu-
gies. mentation of company working procedures
The ISO 27000 standard family can be were evaluated. Additionally, first hand
seen to be dominating the “standard- observations at the company’s site were
market”. It appears to be most often re- considered, which is because for some
ferred to and above all it is the only stan- controls measures could have been de
dard for which a certification can be ob- facto present though a documentation isn’t
tained. All other before mentioned stan- present.
dards including ITIL and COBIT and By checking these explicitly and implicitly
Grundschutz refer to ISO 27001 when it present working procedures, against the
comes to certification (Szakats 2004) standard, its controls could be ranked into
(ISACA 2007) (FOIS 2004). three categories
3. METHODOLOGY (1) compliant
We analyzed the suitability of formal stan- (2) attainable
dards with respect to company size by (3) not attainable
discovering typical challenges to their im-
plementation. To do so, we chose case

Proc CONISAR 2008, v1 (Phoenix): §1533 (refereed)


c 2008 EDSIG, page 3
Kluge and Sambasivam Thu, Nov 6, 1:30 - 1:55, Pueblo C

Subjective judgments which are rather


prone to error should in turn be minimized.
ISO 2700x In our case the question of whether a cer-
tain standard section/control has been
Control 1 … fulfilled is an objective one, hence con-
Control 2 … struct validity can be considered to be
Control … ?? maintained for these. The question of
whether a not fulfilled section/control is
attainable is harder to answer. At a first
glance, this leaves room for subjectivity.
The judgments made were however dis-
cussed and a sound justification was
single case
assessment
sought after.
Internal Validity means that the methodol-
ogy used produces valid results, which is
working instructions,
procedures, the case when the studying process draws
common practice
(documented in writing)
(observed)
correct conclusions. This can be at risk if
not all evidence is collected and attended
to and/or false causal relationships are
Figure 2: Sources of Information drawn (Yin 2003, p.36). The study must
Standard controls ranked in category three therefore be complete with regards to the
are the ones of special importance. As evidence. When it comes to conclusions,
they constitute the obstacles within the explanation building must be done with
adoption process they were discussed fur- care and in due consideration of alterna-
ther. For this purpose the company’s IS tive perspectives. Rival explanations need
management was asked for its assessment to be constructed to test the findings for
of the requirement in question and the their validity. Finally it must be made
outcomes were analyzed for plausibility. sure, that the investigation/observation
process does not influence the target of
For the sake of simplicity, not applicable observation and therefore does not
controls have been ranked compliant ra- “measure itself” (Dawson 2005, p.33). In
ther than introducing a fourth category the case under consideration such interfe-
such as “N/A”. This is because for the rences were unlikely to be on hand be-
company’s overall standard implementa- cause most evidence was collected from
tion capabilities it does not make a differ- written documentation which has been
ence for which reason the control does not created prior to the auditing process. As
have to be worked on. for the interview questions such an effect
had to be considered since the trial situa-
3.1.1 Subject of Study
tion could have encouraged the intervie-
The audited company is a manufacturer of wees to answer questions in a slightly dif-
laboratory-equipment and automation ferent light than how they really are.
systems which realizes an annual turnover People’s abilities and level of skills as well
of approximately 2.5 million Euros. Alto- as intents and levels of awareness are
gether there are about 50 employees rather subjective values which could be
working in different departments from slightly biased. Space for variations has
engineering over software development to however not been found large enough to
product manufacturing. significantly influence the findings.
3.1.2 Formal Case Study Requirements The requirement for External Validity re-
fers to the necessity of findings to be valid
According to Yin (2003, pp. 33 ff) the qual-
beyond the investigated case. Findings
ity of a case study can be judged accord-
which hold true in the investigated case
ing to four criteria. (1) Construct Validity,
should apply to every analogue case. In
(2) Internal Validity, (3) External Validity
this connection it must be clearly distin-
and (4) Reliability.
guished between the diff-ferent methodol-
Construct Validity is maintained by mini- ogies that underlie case study and survey
mizing investigator subjectivity (Tellis research as these are frequently confused.
1997). To achieve the maximum objectivi- In survey research, findings are genera-
ty during a study, a “sufficiently operation- lized from a sample to a larger universe.
al set of measures” is put forth on which The underlying principle is statistical gene-
decisions can be made (Yin 2003, p. 35). ralization. The sample structure is thus

Proc CONISAR 2008, v1 (Phoenix): §1533 (refereed)


c 2008 EDSIG, page 4
Kluge and Sambasivam Thu, Nov 6, 1:30 - 1:55, Pueblo C

decisive for whether the external validity working domain, annual turnover etc. and
of a survey is maintained. Case studies could be used for sample stratification.
again rely on analytical generalization and Section B polled framework conditions of
therefore don’t constitute a sample which the company. As opposed to section A, it
must be picked according to statistical did however focus more on the inner struc-
rules (Yin 2003). The generalized findings ture and workings than on external figures
should however be tested e.g. by replicat- such as the turnover. Section C reflected
ing them across cases and test for whether the current state of the company’s IT se-
they hold true or not. The online survey curity or related matters. Especially it
has in some instances been used to do so. asked for whether certain technologies or
Using a multi method approach, cohe- techniques are used.
rences discovered during the study were
4. RESULTS
tested against the survey results to test if
the statistical data support the analytically 4.1 Case Study Results
gained findings.
From the 133 controls contained in ISO
Reliability is the fourth quality criterion of 27001, we found 35 of them to be attaina-
a case study and it is said to be achieved ble with the available means, staff and
when the investigation process adheres to skills. 68 controls were even found to be
well documented standards assuring that a already compliant as a result of docu-
later investigator would come to the same mented working procedures evolved with-
conclusions about a case if he followed out prior knowledge of the standard and
them. For this purpose Yin (2003, p.37) derived from the company’s intuitive un-
suggests the usage of a study protocol derstanding of security. 30 controls have
which beneath an overview over the been marked as unattainable when at-
project contains all procedures carried out tempting to implement it. Reasoning
as well as the study questions. Since the brought up four main rationale:
case study is based on an audit which itself
is a well documented process, this re- (A) A too weak market position. Large
quirement is naturally fulfilled. enterprises closing large deals with their
business partners can justify demands
3.2 Online Survey such as including IT security terms into
acquisition or cooperation contracts. The
The online survey was used to gain empiri-
studied company does not invest enough
cal data beyond the single case at hand.
turnover to make such demands (is appli-
For this purpose, key business figures and
cable to controls 8.1.2, 10.2.1, 12.1.1).
some security relevant details were polled.
(See appendix for more details on the sur- (B) Technical Difficulties. Some controls
vey instrument) require technical equipment which is not
available. Off the shelf vendor software
3.2.1 Target Population
does not always satisfy requirements
The target population of the survey was (10.6.1, 11.4.1, 11.4.4) but no better
the entirety of medium sized enterprises substitute can be found in the same price
preferable with a number of employees range. Also, procedures like testing a dis-
between 40 and 100. aster recovery case cannot be fully carried
out because fallback hardware is only
To cover all industries alike, we drew a
available to a limited degree i.e. IT sys-
random sample of this population by par-
tems are not 100% redundant and testing
ticipants via email and phone. The infor-
anyway would interrupt the operation of
mation base for the invitations has been
the daily business (14.1.5). With the IT
taken from different sources like yellow
environment being a grown structure, in-
pages, the chamber of commerce and
homogeneity is common among the prod-
trade directories obtained from industrial
ucts used. Despite the small size of the
estates. All respondents participated vo-
network, vulnerability management is an
luntarily and no inclusion or exclusion cri-
exhausting task in the absence of afforda-
teria were defined.
ble technical solutions. This results in the
3.2.2 Structure and Content of the need to manage vulnerabilities manually.
Survey The same is true for regular reviews of
user access rights (12.2.4) and source
The survey was divided into three sections code management (12.4.3). Both tasks
(A, B, C). Section A polled general infor- could be automated if better affordable
mation which allow for a classification ac- solutions were available. Since they are
cording to the number of employees, not, it overworks available manpower.

Proc CONISAR 2008, v1 (Phoenix): §1533 (refereed)


c 2008 EDSIG, page 5
Kluge and Sambasivam Thu, Nov 6, 1:30 - 1:55, Pueblo C

(C) Skill/Staff shortage. With most em- Non-response can have different causes
ployees being trained in the businesses and it is important to highlight, that a low
main fields of activity, specialist knowledge response rate taken by itself does not imp-
in computer forensics and law is rather not ly a low quality of the sample. Whether a
available (6.1.5, 10.8.1, 13.2.3, 15.1.1, result is generalizable despite a low re-
15.1.4). sponse rate depends on its reasons. More
precisely: A high response rate is neither
Among other techniques, ISO 27000 utiliz-
essential nor sufficient. Schnell et al.
es segregation of duties as an organiza-
(2005) point out that the generalizability
tional measure to achieve transparency
of sample results depends on whether the
and therewith security. Segregation how-
participation behavior is linked to the mat-
ever requires individuals between which
ter of study. Further they state that if
duties can be segregated. Given the small
there is no link present one can assume
number of IT employees a segregation is
that responses are “missed at random” so
often not achievable (10.1.3, 10.10.4,
that there is not necessarily a skew at
15.3.1).
hand.
Some demanded security management
4.2.1. Answers
tasks are in the nature of their work at-
tainable, the time needed to carry them Practically all responding companies stated
out lies however by far beyond what is that their company IT was business critical
available to IT staff. Additional employees to them (96%) but only a small part of
would be needed to keep track with them. them (17%) had a written IT security poli-
Examples are a complete asset manage- cy in place.
ment, functionally testing each software
Key business figures and security policies.
update or patch as well as input/output
Furthermore, the annual turnover can be
validation for vendor products (10.3.2,
found to have no measurable influence on
12.2.1, 12.2.2, 12.2.4, 12.5.4, 12.6.1).
whether the company makes use of formal
Doubtful Cost-Benefit Relation. Some standards or not.
measures like the physical barriers and
Nearly a third of the interrogated compa-
entry controls (9.1.1, 9.1.2) have a doubt-
nies stated that they had experienced se-
ful cost-benefit relation. The same is true
curity related incidents in the past. This
for the helpdesk service management
was usually more than once and in two
(9.2.4) and an even more detailed incident
instances the company even filed a com-
response plan (13.2.1).
plaint. There is no recognizable correlation
Due to its fields of activities, some controls between company size and the frequency
do not apply to the audited company. of occurrence of security incidents. Except
Controls 10.9.1 through 10.9.3 for exam- in one case, all companies that had expe-
ple deal with security in electronic com- rienced security incidents didn’t have a
merce systems. Since no such system is written security policy and vice versa.
in place, they could be skipped.
Impact of general business regulation on
4.2 Survey Results security management. Several of the res-
ponding companies said their business
The survey had a total amount of some 30
underlay a governmental regulation such
valid and plausible responses which fall
as those for engineering disciplines, quality
under the working definition of medium
standards for food production or manufac-
enterprises. As for the companies’ work-
turing of pharmaceuticals. We anticipated
ing domain, the IT industry makes up the
that regulated professions could make
largest group of industries, however it
more frequent use of formal standards as
doesn’t constitute the majority of answers.
they could display proper handling of po-
Reaching from construction engineering
tential security risks to regulatory authori-
over media to controlling, the sample cov-
ties. We found however no connection
ers several industries.
between the regulation of businesses and
The response rate of the survey was the application of formal security stan-
around 5 percent. While it is obviously dards – that is, companies operating in
desirable to have higher rates, the rela- regulated businesses do not have written
tively low rate does not necessarily pre- security policies more often. The same is
vent results from being generalizable to a true for the adoption of and certification
bigger population. according to other standards such as ISO
9000 for process quality management. In
fact even most (otherwise) certified com-

Proc CONISAR 2008, v1 (Phoenix): §1533 (refereed)


c 2008 EDSIG, page 6
Kluge and Sambasivam Thu, Nov 6, 1:30 - 1:55, Pueblo C

panies did not have a written security poli- the survey asked for the existence of a
cy, and those which had a security policy legal department, employees trained in
in place, did not have any (other) certifica- data protection law and computer foren-
tion. sics. As expected, all companies which
have a security policy, also have a data
Cooperation and mutual agreements.
protection policy in place. Companies do
Some formal security standards such as
however have a data protection policy
ISO 27000 require organizations to have
three times as often as they have a securi-
mutual security agreements and require
ty policy. A legal department again is an
cooperating parties to maintain the same
uncommon thing among respondents and
level of security standards. All companies
nearly all companies that have one anyway
which had a written IT security policy did
are the ones having a security policy. All
also have cooperation contracts with other
employees trained in computer forensics
parties. The reverse is however not true.
work in a company having a security poli-
Several companies did not have a security
cy. Legal skills as well as those in com-
policy despite the fact that they were in a
puter forensics fall together with the exis-
contractual (cooperation) relationship with
tence of a security policy. It is remarka-
other organizations. The research as-
ble, that external help appears typically
sumption that cooperation contracts could
not to be sought.
therefore lead to companies encouraging
others in elaborating a policy cannot be Appraisal of business decisions. Some
affirmed based on the data at hand. It questions in survey section C were de-
might however still be the case. Eventual- signed to spot check the current state of IT
ly this can just not be shown because so security within the organization. It has
few medium enterprises do use IS stan- been anticipated, that only few respon-
dards. When two companies not adhering dents have made use of an IS standard.
to standards set up a cooperation relation- To verify if the waiver of IS standards can
ship, there is no encouraging motivation be rationalized from a technical and from a
existent. Pointedly analyzing standard business perspective, some questions tried
compliant companies could reveal more on out if the company’s current IT environ-
this. ment is based upon a profound basis tak-
ing information security into account.
Security policies and workload. Another
aspect of interest is the burden of work- The survey asked how IT system mainten-
load imposed by implementing a formal ance responsibilities are arranged, whom
standard. Intuitively it should be expected, security related incidents are reported to
that as the amount of manpower grows, so and how properly IT facilities having dif-
does the capability to implement a stan- ferent security levels are separated from
dard and hence the company is more likely each other. Finally it asked if the business
to use one. value of certain services and therefore the
financial damage in case of outages is
We polled the amount of IT manpower
known to the company’s management.
available to the organization and deter-
mined the proportion of the total amount All these aspects of IT security are handled
of employees to the amount of IT person- in the considered IS standards but would
nel. Proportions did however display a big at the same time be explicable by common
variance so it was not possible to conclude sense. Their accomplishment would ar-
that with a growing amount of employees, gumentatively assist the company’s negli-
IT staff or a better proportion in both of gence of IS standards. Failing them how-
them it would be more likely for the com- ever hints to a potential misconception of
pany to have a security policy. what is necessary to maintain the compa-
ny’s IT environment’s security.
As for the overall amount of time needed
to implement a policy, responses indicated Practically all respondents did answer they
a workload between one and twelve had clearly lined out responsibilities for IT
months depending on the company size. tasks. At the same time nearly half of
them stated that non-IT staff were in-
Availability of key qualifications. Some
volved into maintaining IT systems, which
key qualifications are requirements for the
according to expectations is more likely to
successful implementation of a security
lead to mishandling.
standard. A data protection policy for ex-
ample is a prerequisite but for its elabora- Nearly one fourth mixes private informa-
tion, the essential skills must be present tion processing facilities with corporate
within the organization. Concerning this,

Proc CONISAR 2008, v1 (Phoenix): §1533 (refereed)


c 2008 EDSIG, page 7
Kluge and Sambasivam Thu, Nov 6, 1:30 - 1:55, Pueblo C

ones which is an ideal prerequisite for in- is affordable measured by the company’s
formation leakage in either direction. IT budget. So the potential generalizabili-
ty of this point goes back to rationale A.
Approximately half of the companies have
not determined whom security incidents The same applies to rationale D (doubtful
are reported to. Instead they follow a per cost-benefit relation).
incident strategy and decide in the event
In terms of the skill and staff shortage
of a disaster, which does neither support a
(rationale C), it is visible that the structure
prompt incident response nor does it guar-
drawn by the survey is quite similar to the
antee, that IT staff can obtain eventually
one observed at the audited company. In
required authorization of far reaching
this aspect the survey militates in favor of
measures that might be necessary for sys-
the generalizability of the case study.
tem recovery.
5. CONCLUSIONS
Most companies are not able to estimate
the business value of their IT services and Most literature on the topic of formal in-
the losses that occur in case of downtime. formation security standards approaches
In consequence, the business decisions this topic from the regulatory compliance
about if and how to protect these assets side hence putting an emphasis on busi-
have been made without knowledge of ness aspects. The effectiveness and tech-
their actual value to the company. nical aspects of formal standards are dis-
cussed in a series of papers such as those
4.3 Generalization of results and com-
by Spionen (2006), Hoehne & Eloff (2002)
parison with case study results
and Rahmel (2007). Data about the cus-
As pointed out above, four main rationale tomariness of standard driven security
for why the audited company cannot strategies as well as statistics on which of
straightforwardly implement ISO 27001 them are used predominantly can be found
have been observed during the case study. in popular annual survey reports like those
Assuming that “structural conditions” in by Ernst & Young and Deloitte Touche.
medium enterprises in general are similar Anyhow, until now literature typically illu-
to those at the studied company, we con- minates the subject without specific re-
clude that these will probably apply to a gards to medium enterprises. As an em-
larger picture. This assumption is sup- pirical investigation, we delivered an in-
ported by the survey results. sight into the information security culture
of medium sized enterprises and therewith
Some elements of uncertainty remain. In
contributed to closing this gap.
3.1.2 we mentioned that the attainability
of standard controls has been determined It has been determined how common it is
on the basis of the company’s own as- for medium enterprises to make use of
sessment. Though most assessments formal information security standards and
were based on rather invariant facts like put formal security policies into place.
the availability of certain management Using a case study as research methodol-
software on the retail market, or the avail- ogy it has been assessed which parts of
ability of manpower, this assessment could today‘s most common formal standards
be more or less distinct in other cases. are unattainable and would therefore justi-
However, while single standard controls fy negligence or mitigation of parts of their
could be assessed with another outcome in content. By auditing a medium sized en-
different cases, it appears unlikely that the terprise’s current state of IT security and
proportion of attainable and unattainable its implementation capabilities of ISO
controls would be completely different. 27001 as an example standard, it could be
demonstrated, that the object of study
The too weak market position (rationale A)
could implement 77% of the overall re-
is due to the company’s overall amount of
quirement. While this means, that not all
turnover and the part of it that is invested
requirements can be met right away, it
into IT. Since the term medium enterprise
also demonstrates, that the great majority
is for the one thing defined based on the
can. In line with (BSI100-2), the amount
company’s turnover it can be anticipated,
of compliant and attainable controls
that this situation will not be significantly
represents the pareto-part of all possible
different in other companies.
security measures.
The technical difficulties stated in rationale
The fact that 51% of standard controls
B are due to a lack of available technical
were not implemented at the audited com-
off the shelf solutions in a price range that
pany but were attainable right away, re-

Proc CONISAR 2008, v1 (Phoenix): §1533 (refereed)


c 2008 EDSIG, page 8
Kluge and Sambasivam Thu, Nov 6, 1:30 - 1:55, Pueblo C

flects the generally accepted view, that BS ISO/IEC 27002:2005, Information


formal standards help companies to com- technology. Security techniques. Code
plement their own list of imaginable secu- of practice for information security
rity incidents against which the organiza- management (2005)
tion is to be protected. The fact that for- http://www.bsonline.bsi-
mal standards are beneficial contributions glob-
towards a holistic security strategy applies al.com/server/PdfControlServlet/bsol?p
to medium enterprises just as it does to dfId=GBM24%2F30166440&format=pdf
large ones.
BS7799-1: Information security manage-
Medium enterprises often dispose of fewer ment, Part 1: Code of practice for in-
means as compared to large enterprises. formation security management (1999)
This causes hurdles on theses companies’
BSI-Standard 100-1 Information Security
way to implement standards. At the same
Management Systems (ISMS) (2005)
time however, their sometimes more con-
http://www.bsi.de/english/publications/
strained field of activity leads to several
bsi_standards/standard_1001_e.pdf
requirements not being applicable and
therefore checked off without need for BSI-Standard 100-2: IT-Grundschutz Me-
further action. thodology (2005)
http://www.bsi.de/english/publications/
7. BIBLIOGRAPHY
bsi_standards/standard_1002_e.pdf
Ambi, K.D.: Introduction to Information
BSI-Standard 100-3: Risk Analysis based
Security Standards (n.d.)
on IT-Grundschutz (2005)
http://egovstandards.gov.in/states_rep
http://www.bsi.de/english/publications/
ositories/andhra-
bsi_standards/standard_1003_e.pdf
pra-
desh/brainstroming_sessions/andhra- Dawson, Christian W.: Projects in Compu-
pradesh/network-information-security- ting and Information Systems (2005)
standards/egsworkshopfile.2006-12- Addison Wesley ISBN: 0-321-26355-3
13.0649253072/at_download/file
Ernst & Young: Achieving Success in a
Anderson & Moore: The Economics of In- Globalized World: Is Your Way Secure?
formation Security (2006) - Global Information Security Survey
http://www.cl.cam.ac.uk/~twm29/scien (2006)
ce-econ.pdf http://www.ey.com/global/assets.nsf/In
ternational/TSRS_-
Anderson, Ross: Why Information Security
_GISS_2006/$file/EY_GISS2006.pdf
is Hard - An Economic Perspective
(2001) Federal Office for Information Security:
17th Annual Computer Security Applica- Guideline IT security [German] (2007)
tions Conference http://www.bsi.de/gshb/Leitfaden/GS-
http://www.acsac.org/2001/papers/110 Leitfaden.pdf
.pdf
Federal Office for Information Security: IT-
Barlette & Fomin: Exploring the suitability Grundschutz Manual (2004)
of IS security management standards http://www.bsi.de/english/gshb/manual
for SMEs (2008) /download/modules.pdf
Proceedings of the 41st Hawaii Interna-
Flyvbjerg et al: Five misunderstandings
tional Conference on System Sciences
about case-study research (2004)
2008
Sage Publications
Available at:
http://flyvbjerg.plan.aau.dk/MSFiveMis9
http://csdl.computer.org/comp/proceedi
.0SageASPUBL.pdf
ngs/hicss/2008/3075/00/30750308.pdf
Höne, Karin & Eloff, J. H. P.: Information
BS ISO/IEC 27001: 2005 Information
security policy — what do international
technology. Security techniques. Infor-
information security standards say?
mation security management systems.
(2002)
Requirements
Computers & Security, Volume 21, Is-
sue 5, 1 October 2002, Pages 402-409
doi:10.1016/S0167-4048(02)00504-7,
Elsevier Science Ltd.

Proc CONISAR 2008, v1 (Phoenix): §1533 (refereed)


c 2008 EDSIG, page 9
Kluge and Sambasivam Thu, Nov 6, 1:30 - 1:55, Pueblo C

Institute for SME Research BONN: SMEs in Tellis, Winston: Introduction to Case Study
Germany - Facts and Figures (2004) (1997)
http://www.ifm- The Qualitative Report, Volume 3 Num-
bonn.org/ergebnis/sme-2004.pdf ber 2 [Online]
http://www.nova.edu/ssss/QR/QR3-
ISACA: COBIT 4.1 Executive Summary
2/tellis1.html
(2007)
http://www.isaca.org/AMTemplate.cfm? Thelen, Mary J.: Integrating process im-
Sec- provement, ISO 9000 and TQM in SITA
tion=Downloads&Template=/ContentMa Research and Development (1997)
nage- The TQM Magazine - Volume: 9 Issue: 4
ment/ContentDisplay.cfm&ContentID=3 Page: 265 – 269
4172 ISSN: 0954-478X - DOI:
10.1108/09544789710181880 - Pub-
ISMS User Group: Certificate Register
lisher: MCB UP Ltd
(2008)
http://www.iso27001certificates.com University of Melbourne: IT & ITIL based
Glossary of Terms (2008)
ISO: The ISO Survey of ISO 9000 and ISO
http://servicedesk.unimelb.edu.au/kno
14000 Certificates(2000)
wledgebase/itservices/a-z/p.html
http://www.iso.org/iso/survey10thcycle
.pdf Yin, Robert K.: Case Study Research –
Design and Methods (2003)
Martins, A & Eloff, J.H.P.: Measuring In-
Applied Social Research Methods Series
formation Security (2001), Proceedings
Volume 5, Third Edition – Sage Publica-
of Workshop on Information Security –
tions ISBN 0-7619-2552-X
System Rating and Ranking, Virginia
National State Auditors Association & U.S.
General Accounting Office: Management
Plannig Guide for Information Systems
Security Auditing (2001)
http://www.gao.gov/special.pubs/mgmt
pln.pdf
Rahmel, J.: Einfuehrung in die Informa-
tionssicherheit [German] (2007)
http://www.wi2.uni-
tri-
er.de/de/cms/teaching/Sommersemeste
r2007/VorlesungInformationssicherheit/
InfoSec-1-Informationssicherheit-
070603.pdf
Rea, Luis M. & Parker, Richard A.: Design-
ing and Conducting Survey Research
(2005)
Third Edition – Wiley ISBN 0-7879-
7546-X
Schnell et al: Methoden der empirischen
Sozialforschung (2005)
[Empirical social research methodology]
Oldenbourg - ISBN: 3-486-57684-4
Siponen, Mikko: Information Security
Standards Focus on the Existence of
Process, not its Content (2006)
Journal Commun. ACM
http://doi.acm.org/10.1145/1145287.1
145316
Szakats, Daniel: IT Maturity and Sourcing
Strategies (2004)
http://www.ifi.unizh.ch/egov/Diplomarb
eit_Szakats.pdf

Proc CONISAR 2008, v1 (Phoenix): §1533 (refereed)


c 2008 EDSIG, page 10
Kluge and Sambasivam Thu, Nov 6, 1:30 - 1:55, Pueblo C

8. APPENDICES

8.1 : Enumeration of not attainable standard controls

Proc CONISAR 2008, v1 (Phoenix): §1533 (refereed)


c 2008 EDSIG, page 11
Kluge and Sambasivam Thu, Nov 6, 1:30 - 1:55, Pueblo C

8.2 Online Survey Instrument

Section A - Company Classification


1. Question: How many employees does your company have? (approx.)
2. Question: What is your average annual turnover? (approx. in USD)
3. Question: What domain are you working in?
4. Question: Is your profession underlying some kind of governmental regulation e.g.
Engineering, Quality Standards for manufacturing pharmaceuticals or the like?

Section B - Company Structure and Organization


5. Question: Has your company obtained some kind of standard certification such like ISO 9000?
6. Question: How many full time IT staff do you have?
7. Question: How many of your employees serving in non-IT positions do perform IT tasks anyhow?
E.g. Sales person responsible for (technically) administering certain services such as a CRM database.
8. Question: Does your company IT have a set out budget? If yes: how much is it?
9. Question: Do you have clearly set out responsibilities for IT tasks?
10. Question: Do you have a data protection policy?
11. Question: How many of your employees are Teleworking e.g. using VPN and/or Terminal Services?
12. Question: Do you have personnel that is trained in data protection law applicable to your compa-
ny’s country of registration?
13. Question: Does your company have a legal department?
14. Question: How many training events (in any subject) has your average employee been on during
the last year?
15. Question: Do you have co-operation contracts with other companies? E.g. collaborative research
and development projects?
16. Question: Have any of your IT services been outsourced? (includes customization of business
applications)
17. Question: Do you have IT personnel that have been trained in Computer Forensics?

Section C- Current State of IT Security


18. Question: Is the correct operation of your IT services business critical?
19. Question: How many security related incidents have you experienced within the last 3
years?
20. Question: Did you file a complaint?
21. Question: Do you have a written IT security policy in place?
22. Question: How many employees have been involved in elaborating it?
23. Question: How many months did it take to set it up?
24. Question: Are you using mobile technologies such as WLAN?
25. Question: Do you make use of PKI services?
26. Question: Has your company been issued a certificate by a certificate authority like Verisign© or
the like?
27. Question: Have you obtained a certification such as BS7799/ISO17799/ISO27001?
28. Question: If you have obtained any other IT security related certifications, please name it here:
29. Question: Can you estimate the loss in USD that would occur if one of your core services such as
Email system, VoIP PBX would fail for a certain amount of time? E.g. 6 hours of Online Shop Down-
time would result a loss of XY$ revenue.
30. Question: Does your company premises have structural conditions that allow being partitioned
into different sections so that different levels of physical access can be granted to personal?
31. Question: Do you have an information classification scheme which allows you to determine which
of your business information needs to be kept secret and how such information shall be handled?
32. Question: Is it technically imaginable that teleworkers gain access to your company network via
VPN using non-company computing equipment such as home PCs?
33. Question: Whom are security related IT events reported to? (CEO CIO/CSO not determined yet,
will be decided then)

Proc CONISAR 2008, v1 (Phoenix): §1533 (refereed)


c 2008 EDSIG, page 12

S-ar putea să vă placă și