Governance vs Management

IT security governance is the system by which an organization directs and controls IT security (adapted from ISO 38500).

IT security governance should not be confused with IT security management. IT security management is concerned with making decisions to mitigate risks; governance determines who is authorized to make decisions.

Governance specifies the accountability framework and provides oversight to ensure that risks are adequately mitigated, while management ensures that controls are implemented to mitigate risks. Management recommends security strategies. Governance ensures that security strategies are aligned with business objectives and consistent with regulations.

NIST describes IT governance as the process of establishing and maintaining a framework

  1. to provide assurance that information security strategies are aligned with and support business objectives, (alignment)
  2. are consistent with applicable laws and regulations through adherence to policies and internal controls, (compliance)
  3. and provide assignment of responsibility, all in an effort to manage risk. (accountability)

Enterprise security governance results from the duty of care owed by leadership towards fiduciary requirements. This position is based on judicial rationale and reasonable standards of care. The five general governance areas are:

  1. Govern the operations of the organization and protect its critical assets
  2. Protect the organization’s market share and stock price (perhaps not appropriate for education)
  3. Govern the conduct of employees (educational AUP and other policies that may apply to use of technology resources, data handling, etc.)
  4. Protect the reputation of the organization
  5. Ensure compliance requirements are met

“Governing for enterprise security means viewing adequate security as a non-negotiable requirement of being in business.”

Governance is doing the right thing, while management is doing things right.

Governance

Management

Oversight Implementation
Authorizes decision rights Authorized to make decisions (empowered)
Enact policy Enforce policy
Accountability Responsibility
Strategic planning Project planning
Resource allocation Resource utilization

Source: Information Security Governance

 

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s

%d bloggers like this: