The Information Security Ownership Question in ISO/IEC 27001 - an Implementation Perspective.

Elizabeth Coles-Kemp, Richard E Overill

Research output: Chapter in Book/Report/Conference proceedingConference paper

1 Citation (Scopus)

Abstract

The information security management standard ISO/IEC 27001 is built on the notion that information security is driven by risk assessment and risk treatment. Fundamental to the success of risk assessment and treatment is the decision making process that takes risk assessment output and assigns decisions to this output in terms of risk treatment actions. It is argued that the effectiveness of the management system lies in its ability to make effective, easytoimplement and measurable decisions. One of the key issues in decision making is ownership. In this paper two aspects of information security ownership are considered: ownership of the asset (as per the ISO/IEC 27001 definition) and ownership of the risk treatment actions. This paper discuses how traditional information security risk assessment methodologies confuse the ownership issue and raises the question as to whether this is simply because they are rebadged computer security risk assessment methodologies or because the significance and the complexity of ownership is underestimated in many forms of information security risk assessment. This paper also presents some observations from practical attempts at implementing an organisationwide information security risk assessment methodology. The observations were made as part of ISO/IEC 27001 certification assessment visits.
Original languageEnglish
Title of host publicationProceedings of the 4th Australian Information Security Management Conference
EditorsCraig Valli, Andrew Woodward
Place of PublicationPerth, W Australia
PublisherSchool of Computer and Information Science, Edith Cowan University, Perth, Western Australia
Pages49-56
Number of pages8
ISBN (Print)0729806251
Publication statusPublished - 1 Dec 2006
Event4th Australian Information Security Management Conference - Perth, Western Australia
Duration: 5 Dec 20065 Dec 2006

Publication series

NameAustralian Information Security Management Conference

Conference

Conference4th Australian Information Security Management Conference
CityPerth, Western Australia
Period5/12/20065/12/2006

Fingerprint

Dive into the research topics of 'The Information Security Ownership Question in ISO/IEC 27001 - an Implementation Perspective.'. Together they form a unique fingerprint.

Cite this