Suche innerhalb des Archivs / Search the Archive All words Any words

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[infowar.de] RSA Blog: Who Sets The Audit Standards? (John Madelin)



Die IT-Sicherheitsleute sind gerade dabei, sich professionelle Standards zu geben, angelehnt an Juristen, Wirtschaftsprüfer und ähnliche Berufe. Der Titel "CISSP" verliert dagegen offenbar an Wert.
Welcome to the "Institute of Information Security Professionals".
(Gute kritische Lektüre zum Thema Auditing: Michael Power: The Audit Society - Rituals of Verification.) Ich habe die drei Posts hier mal zusammen eingefügt, daher ist die Mail recht lang.
RB

http://www.rsasecurity.com/blog/entry.asp?id=1076

3/30/2006
Who Sets The Audit Standards? Part 1 of 3
John Madelin

A. Introduction -- Audit Standards and "Professionalism"

The conversational noise levels have been building slowly to the point where it is now hard to ignore the hubbub on the subject of public policy, standards, regulation, and professionalism. The latest development for me culminated in an audit standards panel session in which I participated at the RSA Conference. Surprisingly it was very well attended, with standing room only.

Why is the whole question of audit standards and the associated theme of professionalism blossoming?

The panel was chaired by Mary Ann Davidson, the CSO from Oracle, who asked us all the question: "Audit Standards:- Why, What, Who, When and How?", which was an appropriately broad approach to an apparently "small" subject. Unsurprisingly we quickly extended the discussion to incorporate the whole question of professionalism and the "fabric of trust" that IT security implies.

Security is an arcane subject, requiring a degree of knowledge and experience vested in a small handful of deeply-specialised individuals, where the risk of poor quality has wide-reaching implications, is costly, and of profound impact to society.

Now substitute "legal profession" or "medical profession" for the first word of "security" in the previous paragraph and you quickly see why security has the potential to be deserving of a degree of "professionalism" hitherto reserved for lawyers, accountants, and doctors. (You might even include architects, since - if there were no professional standards - more buildings would collapse etc. etc.; but I would argue that this is dropping below the "impact to society" radar of the big "P" professional bodies. But you get the point.)

So the discussion quickly floated up to the whole question of "professionalism" as these things tend to do these days, which was just as well, because in preparation for the panel I had started to think about how the professional accounting body, of which I am a member, came about.

B. Ancient Accounting and Subsequent Audit -- an Analogy for the Security Industry.

It Started with the right Environmental Conditions

First of all the foundation of auditing is rooted in accounting. Audit is really all about managing and controlling the delicate balance between the art and science of numbers, and the associated underlying value and its reflection in the public domain. In considering why accounting developed in 14th century Italy instead of ancient Greece or Rome, accounting scholar A. C. Littleton describes seven "key ingredients" which led to its creation:

* Private property: The power to change ownership, because book-keeping is concerned with recording the facts about property and property rights * Capital: Wealth productively employed, because otherwise commerce would be trivial and credit would not exist * Commerce: The interchange of goods on a widespread level, because purely local trading in small volume would not create the sort of press of business needed to spur the creation of an organized system to replace the existing hodgepodge of record-keeping * Credit: The present use of future goods, because there would have been little impetus to record transactions completed on the spot * Writing: A mechanism for making a permanent record in a common language, given the limits of human memory * Money: The "common denominator" for exchanges, since there is no need for book-keeping except as it reduces transactions to a set of monetary values
    * Arithmetic: A means of computing the monetary details of the deal

Although many of the individual components did exist prior to the 15th century they did not coalesce in a form, strength, or combination until this particular epoch. Once they had done so the establishment of a coherent accounting system and the subsequent audit standards and "professional bodies" became inevitable.

Accounting; the Foundation of the Audit Profession -- Summa; the Foundation of Accounting

The innovative Italians of the Renaissance were widely acknowledged to have elevated trade and commerce to new levels, and Luca Pacioli was a true Renaissance man. He had knowledge of literature, art, mathematics, business and the sciences, fully developed during his 50 years, at which point he wrote his fifth book: "Summa de Arithmetica, Geometria, Proportioni, et Proportionalita" ("Everything about Arithmetic, Geometry, and Proportion").

It was written as a digest of mathematical knowledge, and accounting was only one of five sections covered, containing 36 short chapters on book-keeping entitled, "De Computis et Scripturis" ("Of Reckonings and Writings").

The Summa had instant impact on the whole subject of accounting and a standardised professional approach -- thanks to its publication coinciding with the environmental conditions of extreme "readiness" outlined above. As a curious aside - it's interesting to note that the roots of both security and accounting are historically so firmly embedded in the mathematical firmament.

From Accounting, Audit and Professionalism was an inevitable development

For those interested in pursuing the story you can find more details here. Suffice to say that the gradual evolution of accounting, reporting, professional training and government charter were now an inevitable corollary, and by 1880 the professional bodies had merged globally.

-----------------------

http://www.rsasecurity.com/blog/entry.asp?id=1077

4/5/2006
Who Sets The Audit Standards? Part 2 of 3
John Madelin

Did you miss Part 1 of John Madelin's Who Sets the Audit Standards?

C. The Perfect Storm -- IT Conditions Conspire To Create a State of Readiness
We can see similar environmental factors conspiring together today to re-enforce the need for professionalism in the fabric of trust supported through "good security" in its broadest sense.

The major environmental factors coalescing to create a perfect storm (in the context of profound commercial, social, cultural and economic impact) -- and re-enforcing the need for a "professional body" -- might reasonably be considered as follows:

Booz Allen Hamilton Graphic
http://www.rsasecurity.com/blog/bimgs/060403/imperatives.jpg

(from a Booz Allen Hamilton report commissioned by the Alliance for Enterprise Security Risk Management.)

We can argue that this list is not exhaustive. For example, on the apparently simple question of Device Proliferation (another facet directly associated with questions of security and accountability) the normally restrained investment bank Jefferies Broadview is quoted as follows:

"We believe we are poised for a wealth creation opportunity that is as powerful as the Internet and an order of magnitude more pervasive. Untethering and distributing the Internet to the myriad mobile devices
from phones to iPods to Blackberries is an even more powerful wave than
the internetworking of the computing world in the 90's."

That is rather uncharacteristic hyperbole from an investment banker, but quite appropriate to the sheer scale and importance of device proliferation and its impact on all of us. Other examples of similar importance and magnitude might include high capacity network availability, mobile working and a whole list of other "mega trends" all of which have a direct correlation with risk, trust, control and accountability. Finally, and not to labour the point too heavily, all of these elements seem to be occurring simultaneously and coalescing in a form, strength, and combination that characterises our epoch as one of great change.

The analogy between the birth of the accounting and audit profession, and the birth of security as a profession seems to have substance in that we now see a security profession evolving and emerging, albeit in an ad hoc and piecemeal fashion. I can list the following "security bodies" just off the top of my head, I am sure a quick trawl of Google would unearth many more:

    * SANS Institute
    * ISACA
    * (ISC)2
    * NIST
    * ASIS
    * ISSA
    * DTI
    * SAINT
    * BSI
    * 50msc.com
    * OECD
    * CCEVS
    * CIAC
    * CERTIFIED MAIL ITGI
    * ISF

Furthermore, as demand for security specialists increases we see a growing community of self-trained individuals specialising in one or other particular facet of security and with no real accreditation. The CISSP qualification is being somewhat de-valued, because rather than re-enforcing years of experience with the stamp of "letters after your name" there is a growing breed of aspiring security specialists cramming to pass the exam with little or no real experience.

An old colleague of mine, Yves Le Roux (representing both (ISC)2 and ISACA) tells me that the Institute of Information Security Professionals was discussed in both (ISC)2 European Advisory Board and ISACA/ITGI Security Management Advisory Committee recently. In common with others among the professional bodies listed above, many of whom were actively involved in the long process of establishing the IISP, these two important bodies recognise the good foundations, the synergy, the quality and weight of key players sponsoring the initiative, and that ISACA and (ISC)2 should continue to be involved with the IISP since many ISACA and (ISC)2 members were involved with the formation of the group. It was also recommended that members should individually join the IISP.

Conclusion
The world has changed so comprehensively thanks to the conditions outlined, that complexity, control, accountability, responsibility, trust and risk have become much more challenging and fluid concepts. IT, and in particular Information Security, are now more significant in establishing a fabric of trust than almost any other discipline, including accounting and law. To quote Alun Michael, the UK Minister of State for Industry:

"The department has long recognised the critical importance of information security as a discipline that underlines trust in the information age."

D. What Constitutes a "Professional Body"?
Continuing from the dual themes -- of "many bodies, each with a perspective", and an immediate acknowledgement that the training and professionalism of security specialists is paramount - leads us to consider the whole question of what other specific components could be included to constitute a "professional body". Some of those referred to are technical; some are educational; some are government departments publishing on security issues and recognising such issues to be of public importance; some of them are communities for information sharing. Of all of these various points, which are the most important ingredients of a body that could be described as "professional"?

This is a subject nicely covered in the IISP Blueprint, introducing the following basic elements common to most professions and between them constituting the main ingredients of our trust in lawyers and accountants:

    * a community of practitioners and theoreticians
    * a formal education process
    * an intellectual domain/common body of knowledge
    * a tradition
    * a communications network for the members
    * entry requirements and concomitant barriers to entry
    * a recognition of public responsibility amongst the members
    * a willingness to act with restraint for the common good by the members
    * adoption of a code of good conduct
    * Legal charter/recognition

In other words, a profession must be consistent, responsibly-behaved, current, and have "teeth".

Many of the bodies outlined have a number of the elements suggested, but none have everything.

...It's Technical, Isn't It?
Most people in our industry immediately associate security professionalism with good technical capability, either in the development process itself, or in the architectures and solutions.

A quick straw poll of random people in the few weeks running up to the RSA Conference, when asked what I meant by "professional body", concluded that NIST already provides for such standards. I was encouraged chatting with Mathew Scholl from NIST immediately before the panel to hear him emphatically acknowledge both the need for professionalism and the fact that - in its broadest sense -- it wasn't something he associated with NIST. Mathew was quite clear that NIST has a responsibility for doing one piece (the technical piece) very well, but that this doesn't incorporate the broader knowledge capital, charter, training and other "people, process, strategy" facets outside the realm of the technical.

I can't emphasise this piece enough -- that most people instantly associate "audit standards" (in relation to information security) as being just about technical standards. Security is so much more: with most threats acknowledged as coming from the inside; with a growing recognition that social engineering is the weakest link; with "brand" and "trust" blending in so many consumer-facing models; and with complexity translating to more human error of greater impact on our lives -- to name but a few.

Can't We Just Hand the Problem to the Auditors to Deal With?
Another common suggestion I had was that audit firms could simply broaden the scope of their audit.

Well, I can certainly talk from the perspective of a solid understanding of the scope here, since I am a qualified auditor with years of hands-on experience in the early stage of my career.

Accounting is an extensive, arcane and important subject that affects every one of us both directly and indirectly. It took me four-and-a-half years to qualify, during which time I was completing my formally accredited "on the job experience"; and a further two years to upgrade
from an "ACCA" (meaning that I passed the exams) to an "FCCA" (a
"professional" accountant/auditor), during which time I was expected to continue to demonstrate growth and "relevant" experience. To maintain the audit certificate one must continue to earn professional points through an ongoing process of accredited professional education.

There are whole ecosystems of subject material in the qualification, incorporating taxation, financing and leveraging, stock valuation, intangibles such as brand, work in progress, manufacturing, and so on. Each of these elements reflects a broad and intellectually challenging area in its own right just at the mechanical level. Beyond the mechanics of how each component works we extend to the auditablity and judgement of any one of these issues individually, but more importantly, combining them together in a living and breathing business ecosystem requires great depth and professionalism.

To think that one might conveniently add "security" to the curriculum is at best unrealistic. I have spent 10 years in the security industry, and as members of the Jericho Forum sometimes remind me -- I am a relative beginner. How appropriate is it to conveniently append a huge and highly specialised additional industry to the existing remit of "accounting-based audit" -- thereby risking the dilution in effectiveness of both sides of the equation?

-----------------

http://www.rsasecurity.com/blog/entry.asp?id=1080

4/9/2006 6:00:18 PM
Who Sets The Audit Standards? Part 3 of 3
John Madelin

Did you miss Part 1 or Part 2 of John Madelin's Who Sets the Audit Standards?

E. What Do the Members and Stakeholders get from the Professional Body?
A primary driver is to be able to demonstrate that those responsible for security are fit for the job that they are undertaking. A secondary driver is the need for organisations to be sure that they are applying sound practice. The stakeholders are therefore the individual members of the professional body, the organisations that benefit from their services, and the wider community at large—for whom a fabric of trust would ensure confidence in transactions and online behaviours.

Once again, drawing from the IISP blueprint…

Members of a professional body or institute in information security would benefit in many ways including:

* Members would be able to demonstrate that they possess an industry-recognised level of knowledge, experience and integrity * Members would have a high level of trust and confidence in the ability and integrity of other members * Members would have access to a source of reference and advice which would help them in their day-to-day work * Members would have greater clarity regarding interfaces with other aspects of security such as physical security, operational risk and investigations * Members would have confidence in applying best practices approved by the professional body * Senior members would have confidence that more junior members had a broad level of understanding of information security as a whole * Members would have confidence that they are doing the right things where their actions are supported by the standards and practices of the professional body * Members would be able to site the standards of the professional body to support their actions * Members would have an authoritative interface with government, enabling dialogue on key regulatory issues * Members would be supported in their personal and professional development * Members would be able to participate in a Forum for sharing knowledge, and have access to senior members who have expertise in particular areas

There are also wider benefits to be gained from the establishment of a professional institute by organisations such as regulators, employers and suppliers. These benefits include:

* A member's organisation will be able to show to regulators, auditors, shareholders and other stakeholders that security is being addressed by appropriately skilled and knowledgeable individuals * Business, Government and society at large would have an increased level of trust and confidence that information security was being addressed in an appropriate, professional manner * The professional body would be able to make authoritative rulings on key issues * A professional body would raise the recognition of those engaged in information security to a par with those of other professions such as lawyers, accountants and surveyors

F. What's Next for us to Continue to Support Professionalism in Information Security? Going back to my RSA Conference panel experience—my feedback shows that there was an absolute consensus that a professional body, in a form reflected by the IISP, is a requirement.

Those of you who have been reading the IT press will see that the launch of the IISP made front page news in Computing Magazine recently.

There is still a long way to go, not least of which will be for us to collectively establish a common agreement over what “information security” means. The subject extends out in every direction to an increasingly distant and somewhat ambiguous boundary. Most people recognise the three key words of information security

    * Confidentiality
    * Availability
    * Integrity… of information

but beyond that there are many different approaches to the inclusion of business continuity, the place of insurance and risk management, physical and logical security convergence and so on.

In the same way that the audit and accounting professions publish “standards” on subjects of great relevance and importance, the Institute will need to decide the framework of issues and approaches on the key topics within the definition.

Another highly topical example as a case in point—biometrics. This is unquestionably of great sensitivity and importance and falls squarely into the scope of “security”. I am grateful to Bori Toth of Deloitte in showing me a window into the world of this important subject.

There is certainly a lot of published material to choose from in deciding the general frameworks and standards. Britain's ISO 17799 is a ready-made framework and comprehensive in the pieces that it covers. Furthermore, it is gaining traction on a world-wide basis. A quick snapshot of the main headings of ISO 17799 demonstrates its breadth, and anything that avoids re-inventing too much of the wheel unnecessarily has to be a good thing:

ISO 17799 Headings

   1. Business Continuity Plan
   2. System Access Control
   3. System Development and Maintenance
   4. Physical and Environmental
   5. Compliance
   6. Personnel Security
   7. Security Organisation
   8. Computer and Operations Management
   9. Asset Classification and Control
  10. Security and Policy

On top of this, one or two people during the RSA Conference panel asked the practical question of how they might start setting a Board-level audit outline for their businesses (recognising that IISP is in its early dawn). As well as referring them to the ISO I also drew their attention to a useful document: Information Security Governance—Top Actions for Security Managers that can be found here. It is a publication prepared by the IT Governance Institute and designed for Certified Information Security Managers (CISMs), Chief Information Security Officers (CISOs) and information security managers to use as action steps in addressing the questions posed by another ITGI publication: Information Security Governance: Guidance for Boards of Directors and Executive Management.

G. Conclusion
The need for professionalism in a subject of such great importance and relative complexity as information security is now widely-accepted.

As I concluded at my RSA Conference panel, this is not a time for partisan approaches covering areas of limited relevance in a piecemeal fashion.

If this is of as much importance to you as it is to me then I encourage you to join the IISP. I have taken out an individual membership, and RSA Security is now going through the process of completing the “founder members” application together with many of our competitors, government departments, representatives from academia, start-ups, systems integrators, and a whole variety of individuals in their own right.

On a practical point you can find more details here.

Supporting professionalism and a common non-partisan approach to good practice in information security is now about sponsoring and supporting IISP in all their endeavours to help lead the information security profession to a point at which it can support all the stakeholders in the wider business ecosystem. This is a key ingredient in helping us all ensure that the “fabric of trust” so profoundly important to tomorrow’s information-centric world can quickly become a consistent and meaningful reality.

In closing I would like to thank the following individuals and their organisations for the encouragement, support and information they provided me with during the long process of considering the big and evolving subject of Information Security Audit Standards and professionalism:-

Arjen van Zanten	KPMG
Bori Toth		Deloitte
Yves Le Roux		CA and ISACA
Professor Fred Piper	Royal Holloway University
Neil Stevenson		ACCA
Mary Ann Davidson	Oracle
Mathew Scholl		NIST
Richard Starnes		ISSA
Greg Bell		KPMG
Alan Stanley		ISF
Nick Coleman		SAINT
Ian Williams		Formerly Datamonitor
Jeff Loeb		Brabeion
David Birch		Consult Hyperion
Uri Ran			BMC


---------------------------------------------------------------------
To unsubscribe, e-mail: infowar -
de-unsubscribe -!
- infopeace -
de
For additional commands, e-mail: infowar -
de-help -!
- infopeace -
de