Juhani
Anttila
Venture Knowledgist Quality Integration
Helsinki, Finland
www.QualityIntegration.biz
GENERAL MANAGERIAL TOOLS FOR BUSINESS-INTEGRATED
INFORMATION SECURITY MANAGEMENT
Abstract
This paper deals with two methodological frameworks, the PDCA Model
and the Process Management Model, which are very basic elements in
the newest international standardization of information security management.
The models were originally developed to support quality of overall
business management in any kind of organizations, and to the information
security standards the models came from ISO 9000 standards for quality
management. Multifarious possibilities of those models are highlighted
in this paper for the needs of information security management that
is seamlessly integrated (embedded) within general business management
activities. Additionally, some significant aspects of modern business
environments are considered in the context of these models and information
security management.
Business-integrated information management
Information security is one of organizations' managerially interested
issues because it is significant and in many cases even crucial issue
from the business realization point of view. In this sense management
of information security is fully analogous to many other highly specialized
key areas for managing organizations to competitive business performance
and success. These areas include management of finance, human resource,
quality of products, innovation, etc. In all these areas it is useful
for organizations to use established and recognized management approaches
and practices.
Information security management can be defined as coordinated activities
to direct and control an organization with regard to information security.
Basic phenomena to be managed characterizing information security
in organizations' products and business activities consist of:
- Integrity - information that one is using is accurate
- Availability - one has access to the relevant information when and
so long it is needed
- Confidentiality - information one is using is not manipulated by
anybody else
Because of its importance for organizations' sustainable business
performance and success and business credibility, information security
management is factually always squarely under the responsibility of
business leaders, and all information security related activities
should be integrated seamlessly with normal business management activities.
Similar general managerial principles and methodology may be used
in all specialized management areas and information security management
is not any exception.
Applying the PDCA Model for managing
information security
A well-known general model for all areas of management including
information security is so called PDCA model or Deming / Shewhart
cycle (see figure 1). This model became popular especially through
American Dr. W. Edwards Deming's lectures of managerial quality during
several decades (from 1950's to 1990's). However, originally the model
was created by American Dr. Walter Shewhart in the 1920's. Later Japanese
Dr. Shoji Shiba has made remarkable work by combining the original
PDCA model with the ideas of managing knowledge and of Buddhist philosophy.
Also American Dr. Joseph Juran's so called Trilogy Model contains
the same elements as the PDCA model. The PDCA model has also consistent
linkages with traditional systems theory and systems dynamics. As
a summary one may notice that PDCA model has a great variety of different
applications, possibilities, and uses.
PDCA model is also strongly related to the following international
standards of information security management:
- ISO/IEC 27001:2005 - Information technology - Security techniques
- Information security management systems - Requirements
- ISO/IEC 17799:2005 - Information technology - Security techniques
- Code of practice for information security management
- ISO/IEC 17799-1:1996 - Information technology - Security techniques
- Key management - Part 1: Framework
These standards are most recognized reference documents for professional
approach of information security management world-widely. These standards
also emphasize the integration of information security management.
Additionally OECD's guidance document:
- OECD Guidelines for the Security of Information Systems and Networks
- Towards a Culture of Security, 2002,
states that information security management should be a flavor in
all organizations' and societies' business cultures.
PDCA model describes how a consistent management consists of four
consecutive activities:
- P: Planning business activities what should be done and what results
should be achieved
- D: Doing business obligations according to the plans
- C: Checking what was done and what results achieved
- A: Acting rationally taking into account the observations and results
of the checking
Figure 1. PDCA model for management (or so called Deming / Shewhart
cycle) and its application in strategic and operational business management
In organizational environments the PDCA model is to be applied in
three different scopes:
- Control: Managing daily operations in business processes in order
to achieve the specified results. Normally rectifying nonconformities
is carried out in connection with control.
- Prevention and operational improvements: Solving acute problems,
preventing nonconformities, and finding / implementing operational
step by step improvements in business processes
- Breakthrough improvements: Innovating and implementing strategically
significant changes in the way doing business
Top business leaders (senior executives) are responsible of the breakthrough
improvements. Control, prevention, and small step improvement should
be carried out by the responsibility of operational managers. All
people within organizations should be aware of the importance of information
security so that they are able to take into account it in their normal
every day business tasks in a simple and natural way without any additional
measures.
For ensuring information security, an organization should carry out
a lot of different information security specific measures in planning,
doing, and checking business activities / results, and reacting to
the situation. Also for information security, the organization should
carry out correcting, preventing, and continual improving actions,
and more comprehensive reengineering of business processes as necessary.
From above mentioned international standards one may find a lot of
information on detailed methodology for those tasks of information
security. Although the standard ISO/IEC 27001 explicitly refers to
the PDCA model, however, the model is applied in the standard rather
unsystematically, inexplicitly, and poorly for the purposes of information
security management.
There are no excuses why control, prevention, small step improvements,
and breakthrough improvements were not relevant also in the field
of information security management. Even normal organizational quality
management practices oblige to use such methods also for information
security. General managerial practices and means can be used but also
professional information security expertise should be incorporated.
This means a close and effective cooperation of business leaders and
information security experts.
Information security management through
business process management
Process approach was used already in ancient plant and construction
activities. The concept is often referred to in cases of natural development.
Through industrialization processes became an everyday concept in
so called process industry. From 1980's process approach has been
used for computers' internal activities according to structured analysis
and design technique (SADT). However, in a large scale business process
approach has been used comprehensively for the benefits of business
management only for less than twenty years, and during that time a
lot of practical means have been developed for that purpose. In these
approaches, especially learning from system theory and system dynamics
was used. To the quality management standards ISO 9000, process concept
was introduced in the 1990's, and later just in very recent years
the methodology came to the international standards of information
security management.
Processes adhere always to all kinds of daily doings or activities
within any organization. In fact, originally the process concept just
denotes any kind of activity or operation. Structural questions of
business processes have become an interesting management issue in
order to increase effectiveness and efficiency of the business operations.
In some cases, however, there has been a danger that structural aspects,
e.g. formal process diagrams, were being harmfully over-emphasized
in process management. Due to its business significance, process management
is a comprehensive business management issue by its basic nature.
Today, however, truly effective and efficient process management implies
a radical change to the established management thinking and structures
in many organizations.
All business results - including information security - are achieved
through managing business processes and projects. Basic (or core or
key - different terms are used in different organizations) business
processes imply continuously running interlinked business activities,
and projects are singular processes for unique business tasks. Both
strategic and operational management levels are involved in this process
approach, the strategic one focusing on managing the network of inter-linked
business processes (i.e. the whole business system) and the operational
one on managing single processes and projects.
In integrating information security practices, it is extremely important
to understand information security issues in the context of business
processes. This is because, in practice (operationally), information
security originates from processes. That is based on the fact that
all process-activities are nowadays very strongly information-intensive,
and information flows between these activities and between different
performers and even between distant operational locations (see example
of figure 2). Thus, information security is affected directly in real
time through process arrangements, tools, and people in practical
work and how these are managed by appropriate and systematic practices.
Figure 2. Information security is realized in the activities and information
flows of business processes (e.g. order/delivery process).
Process management (see figure 3) implies how strategic and operational
business objectives are realized through business processes according
to PDCA (Plan - Do - Check - Act) principle. The operations are managed
by feedback through measurements. There are in fact three PDCA loops
for a comprehensive process management:
a) the loop of control and corrective actions
b) the loop of prevention
c) the loop of real improvements through innovative re-designing and
re-engineering of process(es).
Figure 3. PDCA loops in business process management
Both the whole process network (the business system) and individual
business processes are being managed according to this systematic
model. Management of the comprehensive process network includes normal
responsibilities of the business management, e.g. using business plans,
action plans, business performance assessments, and regular business
reviews. It is essential, that the business system is understood here
especially as a network of business processes and not only as functional
units (organizational "silos"). The scope of managing individual
processes consists of process planning, control of the operation,
performance improvement, and quality assurance. Bases for a process
management are the process plan, process performance assessment, and
monitoring process performance indicators. Process plan is the most
important managerial tool for process management.
In order to take information security issues into account, one should
understand which phenomena within single business processes and between
different processes are critical from the information security point
of view. After that one may be able to define suitable performance
indicators and set quantitative target values for information security
according to the relevant needs and expectations. A key management
issue is to monitor these indicators in a real time and to initiate
- as needed - necessary measures for correction, prevention, or improvement
of performance just according to the PDCA model. From the above mentioned
standards one may find general guidance for defining information security
control means to be applied within business processes.
Also information security performance should be considered both from
strategic and operational point of view. Strategic performance management
of processes consists of an organization's vision- and strategy-based
measures and evaluations of the overall process performance. Needs
of operational process performance measures for daily management are
focused on diagnostics and analysis for corrective and preventive
actions.
Process performance in general and also information security performance
of processes is a fuzzy concept. Process performance evaluation consists
of strategic assessment of the whole business performance (process
network), and operational assessment of individual processes. Assessment
results are useful both for company-internal process improvement and
for quality assurance. Quality assurance includes all those measures
through which an organization demonstrates to its stakeholders that
the organization is capable to fulfill effectively all agreed requirements.
Factors affecting on the use of systematic
managerial tools in business-integrated information security management
Information security management - or more generally business management
as a whole - by using PDCA model and process management calls for
responding to the realities of business environments. Especially nowadays
the needs for managing variety and agility of the operations set new
requirements for all management practices. Fundamental reason is that
today's business environment is uncertain and ambiguous. That includes:
- Emergence and self-organizing networks of actors affecting to business
- Many heterogeneous global actors in virtual networks on the market-place
- All and everything are linked with everything else, all linkages
are not known
- Paradox freedom of the actors ("both-and" instead of "either-or")
- Significance of immaterial issues (information, knowledge, services)
- Increased speed of activities and change
- Significance of transaction phenomena
All these aspects are big challenges also in information security
management.
In all business processes there are three different kinds of activities,
mechanistic, organic, and dynamic, and all of them are inherent in
all business processes and their activities. Mechanistic aspects are
highly disciplined tasks (e.g. access control to certain information
in the order-delivery process), organic aspects relate e.g. to necessary
business interactions with internal and external operational partners,
and dynamic aspects reflect spontaneous human activities in on-time
situations. Business performance and its competitiveness are today
mainly based on organic and dynamic actions. Business management includes
that all these variety dimensions are addressed appropriately in a
process network as a whole and in individual processes. These various
aspects of process activities should be also taken into account e.g.
in the process documentation. Managing complexity is a requirement
of every process, and it goes beyond simplistic tools. In fact, today
most business processes are complex responsive processes of relating.
Information security may be controlled adequately by strict rules
and instructions or by automatic technological solutions only in the
mechanistic parts of process activities. People skills, competences,
awareness, initiatives, commitments and responsibilities, and general
security culture are most essential in the organic and dynamic business
situations.
Achievements in information security management depend on the quality
of management. That is how the business management is really carried
out and how the systematic tools are used over the whole organization.
There are management actions on several levels in an organization
relating to the whole organization, its business units or functions,
business processes, and individuals and teams. Leadership emphasizes
managers' or superiors' personal and human aspects in conducting their
business actions (see figure 4).
Figure 4. Quality of leadership performance. A successful business
leader's primary quality feature is awareness.
A critical issue for process performance is the operation of individual
performers within processes and how they understand their roles and
responsibilities for information security. There should not be any
conflicts between person's activities in a business process and his/her
internal mental process. This kind of conflict causes often significant
threats for information security. Chance to prevent and resolve these
conflicts in an effective manner depends a lot of on social networking
culture in the organization and practices of human resource management
including procedures of compensation, rewarding, incentives, and recognition.
Only some problems may be avoided by replacing human activities within
business processes by automatic IT solutions.
Conclusions
In order to be effective information security management should be
carried out in integration with the normal business management practices
of an organization. Distinct solutions for information security are
abnormal, ineffective, and finally frustrating. Integration is realized
through practical managerial tools. PDCA model is a proved and recognized
methodology for all kind of management. It is very suitable also in
information security management but its use has been rather vague
and all advantages of this methodology have not taken in practice.
Proved business cases demonstrate that process management is in principle
a very simple thing, but its implementation in practice seems incredibly
difficult because it always puts a strain on the organization's leadership
issues. Development of the business processes and their management
is a long-term effort and should take into account realities of business
environments in question. This is also the reason for the difficulty
of its applications in information security management. Another point
is that security professionals are not familiar of the foundations
and practical approaches of process management.
References
1. Anttila J.: Managing and assuring information security in integration
with the business management of a company, Information security, Small
systems security & information security management, Volume 2,
IFIP TC 11, Vienna - Budapest 1998, http://www.qualityintegration.biz/Tonava.html
2. Anttila, J., Business-integrated information security management,
European intensive programme on information and communication technologies
security IPICS'2003, Oulu 2003, http://www.qualityintegration.biz/InformationSecurityIntegration.html
3. Anttila J.: Tacit knowledge - the essence of quality management
systems, EOQ 2005 Annual Congress in Antalya, 2005, http://www.qualityintegration.biz/TacitKnowledge.html
4. Anttila J.: A comprehensive process approach for overall performance
excellence, Quality Conference in Ostrava, 2002, and workshops in
Mumbai and Tallinn, http://www.qualityintegration.biz/BusinessProcessManagement.html
5. Anttila J., Vakkuri J.: Luovan johtajan ISO 9000, Sonera, Helsinki
2001
6. ISO/IEC 27001:2005: Information technology - Security techniques
- Information security management systems - Requirements, ISO, Geneve
2005
7. ISO/IEC 17799:2005: Information technology - Security techniques
- Code of practice for information security management, ISO, Geneve
2005
8. ISO/IEC 11770-1:1996: Information technology - Security techniques
- Key management - Part 1: Framework, ISO, Geneve 1996
9. OECD Guidelines for the Security of Information Systems and Networks
- Towards a Culture of Security, OECD, Paris 2002
10. ISO 9000/9001/9004: Quality management systems, ISO, Geneve 2000
11. Juran J.: Juran on planning for quality, New York 1988
12. Latzko W. J., Saunders D. M.: Four days with Dr. Deming. A strategy
for modern methods of management, Reading 1997
13. Shewhart W. A.,: Economic control of quality of manufactured product,
14. Shiba S.: Evolution of quality: From control to breakthrough TQM,
EOQ Annual Congress, Trondheim 1997