Sie sind auf Seite 1von 68

TEST YOUR SKILLS

A N D TA K E YO U R C A R E E R
TO THE NEXT LEVEL

SET YOURSELF APART


Join an elite group of top professionals with ISACA®’s certifications. Validate your
expertise and boost your earning potential and opportunities with industry-standard
certifications for IS/IT audit, control, risk, security and cybersecurity.

ASSESS YOURSELF AT NO COST


Take a free and quick 10-question assessment for the CISA, CRISC or CISM certifications
to gauge your readiness and plan your next steps toward becoming ISACA certified!

www.isaca.org/FREEQUIZ-Jv4
SCCE’s 18th Annual

Compliance & Ethics Institute


September 15-18, 2019 • Gaylord National • National Harbor, MD

The compliance and ethics industry is growing, with new regulations and strategies emerging on
a regular basis. The annual Compliance & Ethics Institute (CEI) can help you stay informed and
updated, allowing you to maintain an effective compliance program.

Discover the benefits of yearly attendance at the CEI.

• Understand new and emerging risks and


develop strategies for addressing them.
• Gain insights, skills, and tactics to help
develop and maintain a more effective
compliance program.
• Build connections with compliance
professionals at all levels and from
around the world.

1,800+ 150+ 10 learning 100+ 75+ solution


attendees speakers tracks sessions providers

Learn more and register at


complianceethicsinstitute.org
The ISACA® Journal
seeks to enhance
the proficiency and
competitive advantage
3 33 of its international
Information Security Matters: Someone Else Rethinking Risk
Steven J. Ross, CISA, AFBCI, CISSP, MBCP Rajesh Srivastava, CISA, CGEIT, ISO 20000, readership by providing
ITIL Expert, PMP managerial and
5 technical guidance from
IS Audit Basics: Lessons From History 39
Ian Cooke, CISA, CRISC, CGEIT, COBIT Three Strategies for a Successful experienced global
Assessor and Implementer, CFE, CIPM, DevSecOps Implementation authors. The Journal’s
CIPP/E, CIPT, CPTE, DipFM, FIP, ITIL Taimur Ijlal, CISA, CISSP
Foundation, Six Sigma Green Belt noncommercial,
42 peer-reviewed articles
9 Bridging the Gap Between focus on topics critical to
Innovation Governance: The Balance of Policies and Execution in an Agile
Speed and Protection in Innovation Environment professionals involved
K. Brian Kelley, CISA, CSPO, MCSE, Security+ Mina Miri, Amir Pourafshar, CISSP, Pooya in IT audit, governance,
Mehregan, Ph.D., and Nathanael Mohammed
12 security and assurance.
The Network 48
Brennan P. Baybeck, CISA, CRISC, CISM, Analyst and Adversary
CISSP (Disponible también en español)
Jeimy J. Cano M., Ph.D., Ed.D., CFE, CICA

FEATURES
PLUS
14
The Pain of Automation 54
(Disponible également en français) HelpSource
Wade Cassels, CISA, CFE, CIA, Jane Traub, Sunil Bakshi, CISA, CRISC, CISM, CGEIT, ABCI,
CCSA, CIA, Kevin Alvero, CISA, CFE, and AMIIB, BS 25999LI, CEH, CISSP, ISO 27001 LA,
Jessica Fernandez, CISA MCA, PMP

19 56
Acknowledging Humanity in the Governance Crossword Puzzle
of Emerging Technology and Digital Myles Mellor
Transformation
(Disponible également en français) 57 Read more from these
Guy Pearce, CGEIT CPE Quiz Journal authors...

27 59 Journal authors are


The Internet of Medical Things—Anticipating Standards, Guidelines, Tools and Techniques now blogging at
the Risk www.isaca.org/journal/
Mohammed Khan S1-S4 blog. Visit the ISACA
ISACA Bookstore Supplement Journal blog, Practically
Speaking, to gain

Online-Exclusive practical knowledge


from colleagues and to

Features participate in the growing


ISACA® community.

Do not miss out on the Journal’s online-exclusive content. With new content weekly through feature articles
and blogs, the Journal is more than a static print publication. Use your unique member login credentials to
access these articles at www.isaca.org/journal.

Online Features
The following is a sample of the upcoming features planned for July and August.and _________________.
_______________ 1700 E. Golf Road,
Suite 400
Auditing Green IT Governance and Evolving From Qualitative to Understanding Compliance Risk
Management With COBIT 5 Quantitative Risk Assessment in Finance and Banking Schaumburg, IL 60173, USA
J. David Patón-Romero, CISA, Benoit Heynderickx, CISA, CRISC Muhammad Waheed Qureshi, Telephone
PMP, Maria Teresa Baldassarre, CISA, CIPP/IT, CISSP, GPEN, +1.847.660.5505
PMP, Moisés Rodríguez, CISA, ITIL v3, PCIP
and Mario Piattini, CISA, CRISC, Fax: +1.847.253.1755
CISM, CGEIT, PMP www.isaca.org

Discuss topics in the ISACA® Knowledge Center: www.isaca.org/knowledgecenter


Follow ISACA on Twitter: http://twitter.com/isacanews; Hashtag: #ISACA
Follow ISACA on LinkedIn: www.linkedin.com/company/isaca
Like ISACA on Facebook: www.facebook.com/ISACAHQ
INFORMATION
SECURITY MATTERS

Someone Else
Running an IT department used to be so simple. The to carry out their business. Containing all of IT
programmers wrote programs; the technicians within an organization gave management the
Do you have
migrated the programs into production; and the (supposed) ability to secure all of it.
something
operators ran them. These days, programmers to say about this
implement systems purchased from a vendor. The The idea that all of IT could be contained was a article?
techs have their hands full just keeping the chimera. The computers in the data center were
infrastructure (or more likely, the infrastructures) up powered by someone else (the electric company), Visit the Journal pages
of the ISACA® website
and running. And, more often than not, the programs communicated via someone else (the
(www.isaca.org/journal),
are running in someone else’s data center. telecommunications carriers) and were maintained
find the article and click
by someone else (the hardware vendors). Operating on the Comments link to
Let me complicate that a bit more. If the operators are and database management systems were certainly share your thoughts.
running systems at all, they may be running them in not developed in-house. Purchased applications are
https://bit.ly/2X6cpVv
someone else’s data center, a colocation facility or not new either. But, for the most part, there was
colo. Many of the applications and much of the a certain degree of comfort knowing that all of
infrastructure are, or soon will be, rented from a third these systems were running in an access- and
party as a service (or, more likely, as-a-service). And climate-controlled room somewhere in
each of those services may well have been selected management’s own building.
by end-user management with little or no input from
IT personnel who specialize in security, reliability, Where Did the Data Center Go?
recoverability or interoperability with other systems.
Today, the data center is everywhere from
So, organizations are facing problems, if not yet someone’s pocket to the cloud. I am looking at my
crises, of IT governance, security, risk management smartphone and I find applications such as foreign
and control—the perfecta of ISACA’s certifications.1 If exchange calculation, medical benefits, voicemail
you are a holder of any of these, you ought to be and encryption that used to run in data centers. I
concerned. Frankly, even without those certifications, know that these are applications running in a data
there is cause for concern. If you are a programmer, center somewhere that I can access through the
technician or operator, you may already be seeing terminal in my pocket. The point is that both the
jobs of some colleagues disappear from your data center and the terminal used to be in the
organization. Even though someone else is building to which I had to travel in order to work.
experiencing a talent shortage,2 they seem to be on
the sell-side rather than the buy-side.3 The use of colos is recognition that computer
operations and real estate are separable. The
organization had a data center that was built around
Steven J. Ross,
Restructuring the Way IT Is Done CISA, AFBCI, 
many basic controls: who could enter, how fires
The concern is not—or at least, not only—vendor would be prevented, how power failures would be
CISSP, MBCP
Is executive principal
management. It is a fundamental restructuring of managed, how recovery would be carried out if of Risk Masters
the way information technology has been done there were a disaster. Now, those controls are International LLC.
since the dawn of commercial data processing in someone else’s problem. Ross has been
the 1960s. An organization, whether a corporation writing one of the
or a government agency, was viewed as an organic And, when information and the systems that Journal’s most
whole with a consolidated set of information support it disappear into the cloud, management’s popular columns
resources. The objective, only imperfectly achieved, ability to exercise control over them becomes even since 1998. He can
but the goal nonetheless, was to have a single base more tenuous. Depending on what services for be reached at
stross@riskmasters
of information that would be apportioned to each which a particular business function contracts,
intl.com.
business and each authorized individual as needed someone else—the cloud vendor—may be

ISACA JOURNAL VOL 4 3


producing the total environment: the application, the information systems is better or worse for
Enjoying infrastructure and the data center. The cloud is, information security. It is different. Personally, I
after all, just a group of interlocked data centers. think the positives outweigh the problems, but
this article?
With every business unit and, for that matter, every those problems will not go away without addressing
individual, free to acquire its own whatever-as-a- them head-on. The challenge, I propose, is that
• Learn more about,
service, management’s ability to control the use of many of the verities that could be relied upon for
discuss and
information within an organization just vanishes. decades are no longer operative. You cannot build
collaborate on
security into applications or infrastructure if you do
information and
Objections to the Argument not build applications or infrastructure. The walls of
cybersecurity in
the data center are no barrier if you have no data
ISACA’s Online I am not deaf to the arguments that can be made to center and, thus, no walls. You can assure yourself
Forums. what I am saying here. “That may be someone that someone else’s security professionals are
https://engage. else’s problem, but it is not mine. My organization taking care of things. But, in the end, your security is
isaca.org/online still has plenty of applications running in our data not someone else’s problem; it is yours.
forums center.” That may be the case today, but both
market trends and vendor decisions are moving
Endnotes
away from on-premises systems.4 In many cases,
cloud-based applications are already running 1 ISACA®, ISACA Certification, Certified
alongside older on-premises versions in a hybrid Information Systems Auditor® (CISA®), Certified
configuration.5 If the movement out of the data in Risk and Information Systems Control™
center is not occurring in your organization today, it (CRISC™), Certified Information Security
will be tomorrow. Manager® (CISM®), and Certified in the
Governance of Enterprise IT® (CGEIT®),
www.isaca.org/certification/Pages/default.aspx
THE USE OF COLOS IS 2 Manpower Group, “Solving the Talent Shortage,”
USA, 2018, https://go.manpowergroup.com/
RECOGNITION THAT hubfs/TalentShortage%202018%20(Global)%20
COMPUTER OPERATIONS Assets/PDFs/MG_TalentShortage2018_lo%206_
25_18_FINAL.pdf
AND REAL ESTATE ARE 3 Hickey, A.; “Shortage in Cloud Talent as Cloud
SEPARABLE. Job Seekers Lag Employer Demand,” CIODive,
6 December 2018, https://www.ciodive.com/
news/shortage-in-cloud-talent-as-cloud-job-
Another objection is that the trends that I am seekers-lag-employer-demand/543674/
describing are actually positive for security and 4 Samuels, M.; “Cloud Computing: Five Key
control. Maybe the colo or the cloud service Business Trends to Look Out For,” ZDNet,
provider does a better job at a lower cost than your 14 January 2019, https://www.zdnet.com/
organization could ever do, but there is still the article/cloud-computing-five-key-business-
matter that the best way to make something trends-to-look-out-for/
disappear is to declare it to be someone else’s 5 Ashok, A.; “Four Trends in Cloud Computing
problem.6 There is also the opposite point of view, CIOs Should Prepare for in 2019,” Forbes,
that “Security will continue to be an issue with cloud 5 July 2018, https://www.forbes.com/sites/
technology, especially now with the introduction of forbestechcouncil/2018/07/05/four-trends-in-
the [EU] General Data Protection Regulation (GDPR). cloud-computing-cios-should-prepare-for-in-
Given the advantages of cloud computing, many 2019/#35656e394dc2
organizations will likely rush into it without serious 6 For in-depth research on this phenomenon,
consideration of the security implications.”7 I recommend: Adams, D.; Life, the Universe and
Everything, Del Rey, USA, 1982, chapter 3.
The issue as I see it is not whether the movement 7 Op cit Ashok
away from in-house development and operation of

4 ISACA JOURNAL VOL 4


IS AUDIT
BASICS

Lessons From History


So, in case you have been living in a cave and security organizations were siloed, meaning
somewhere, ISACA® is 50—a significant historical information rarely flowed from one group to the
Do you have
milestone. History, we are taught, can often be other. Collaboration between IT and security mostly
something
better understood through artifacts, “An object occurred when required, such as when security to say about this
made by a human being, typically one of cultural or needed IT to authorize a change on the network. article?
historical interest.”1 One of the most significant Communication and coordination between these
artifacts to have been created in ISACA’s history is, groups was often inconsistent and ineffective. Visit the Journal pages
of the ISACA® website
undoubtedly, COBIT®. To me, it represents a large
(www.isaca.org/journal),
part of the collective knowledge of ISACA One example of the lack of IT-security coordination
find the article and click
volunteers—knowledge that was acquired both was that multiple and incomplete software on the Comments link to
before and after its first release in 1996. inventory lists were kept independently by each share your thoughts.
group. Both IT and security rely on accurate
https://bit.ly/2Wbf3Nb
Of course, history is important because we can inventory lists to operate, patch and monitor the
learn from it. Certainly, that humans do not learn
very much from the lessons of history is the most Figure 1—Equifax IT Organizational Structure
important of all the lessons that history has to (2013 - September 2017)
teach.2 In the world of IT audit, we learn from history
in the form of case studies such as data breaches.
In fact, in December 2018, the US House of Chief Executive
Officer
Representatives Committee on Oversight and
Government Reform produced a report on the
Equifax data breach.3 The report contains a section
titled, “Specific Points of Failure,” from which I Chief Information Chief Legal
believe learning can be found. Could COBIT have Officer Officer
helped identify any of these issues?

Equifax IT Management Structure Lacked


Senior Vice Chief Security
Accountability and Coordination President Officer
In 2005, as working relationships between senior
executives became strained, Equifax reorganized its
IT organization structure (figure 1) so that the chief
security officer (CSO), who was responsible for IT Ian Cooke, CISA, CRISC, CGEIT, COBIT Assessor and
security, reported to the chief legal officer (CLO) Implementer, CFE, CIPM, CIPP/E, CIPT, CPTE, DipFM, FIP, ITIL
rather than the chief information officer (CIO). The Foundation, Six Sigma Green Belt
company did not revert the IT organizational Is the group IT audit manager with An Post (the Irish Post Office based in
structure back to its original form (where the CSO Dublin, Ireland) and has 30 years of experience in all aspects of information
reported to the CIO) following new appointees systems. Cooke has served on several ISACA® committees and is a past
member of ISACA’s CGEIT® Exam Item Development Working Group. He is
despite there being multiple discussions to do so.
the topic leader for the Audit and Assurance discussions in the ISACA
Online Forums. Cooke supported the update of the CISA® Review Manual for
The functional result of the CIO/CSO structure the 2016 job practices and was a subject matter expert for the development
meant IT operational and security responsibilities of ISACA’s CISA® and CRISC™ Online Review Courses. He is the recipient of
were split, creating an accountability gap. At the the 2017 John W. Lainhart IV Common Body of Knowledge Award for
time of the breach, the organizational structure did contributions to the development and enhancement of ISACA publications
not facilitate a strong CIO and CSO partnership.4 and certification training modules. He welcomes comments or suggestions
for articles via email (Ian_J_Cooke@hotmail.com), Twitter (@COOKEI),
Depending on the organizational reporting structure LinkedIn (www.linkedin.com/in/ian-cooke-80700510/), or on the Audit and
Assurance Online Forum (engage.isaca.org/home). Opinions expressed are
an organization adopts, the CSO and CIO roles can
his own and do not necessarily represent the views of An Post.
be conflicting or complementary. At Equifax, the IT

ISACA JOURNAL VOL 4 5


organization’s IT systems. In a more collaborative senior executive management,7 however, it also
Enjoying environment, these lists would be merged into a specifies the CISO as the liaison between executive
single master document with both teams working management and the information security
this article?
together to complete the inventory.5 program.8 This, in my opinion, can be done through
the CIO, however, ideally, the CISO should report to
• Read COBIT®
In addition, the organization did not prioritize the CEO.9 In February 2018, Equifax announced a
2019:
cybersecurity. Quarterly senior leadership team revised reporting structure elevating the (now
Introduction and
meetings were held where IT security was just one renamed) CISO to directly report to the CEO.10
Methodology.
of the many topics discussed. Further, the CSO did
https://www.
not regularly attend these meetings because the Equifax Had Serious Gaps Between IT
isaca.org/COBIT
CSO was not considered part of the senior Policy Development and Execution
• Learn more
leadership team. As a result of this, the chief
about, discuss At the time of the breach, Equifax’s internal IT
executive officer (CEO) was not receiving timely
and collaborate management process failed to establish clear lines
information on Equifax’s security posture. The
on COBIT® and of accountability for developing IT security policies
information he did receive was presented by the
frameworks in and executing these policies.11
chief legal officer (CLO), who did not have any
ISACA’s Online
background in IT or security.
Forums. The disconnect between policy development and
https://engage. execution was especially pronounced with respect
Clearly this was not a tenable situation, but how
isaca.org/ to the patch management policy. This policy defined
could COBIT have helped? COBIT has defined the
onlineforums roles and responsibilities, and established
mandate, operating principles, span of control and
authority level of the chief information security guidelines for the patching process. The policy
officer (CISO) (figure 2).6 COBIT does indicate that, designated two employees to lead
depending on a variety factors within the enterprise, implementation—a policy manager and a senior
the CISO may report to the CEO, chief operating leadership team owner. The responsibility of the
officer (COO), CIO, chief risk officer (CRO) or other policy manager was to ensure that all of the work

Figure 2—CISO: Mandate, Operating Principles, Span of Control and Authority Level
Area Characteristic
Mandate The overall responsibility of the enterprise information security programme
Operating principles Depending on a variety factors within the enterprise, the CISO may report to the CEO, COO, CIO,
CRO or other senior executive management.

The CISO is the liaison between executive management and the information security
programme. The CISO should also communicate and co-ordinate closely with key business
stakeholders to address information protection needs.

The CISO must:


• Have an accurate understanding of the business strategic vision
• Be an effective communicator
• Be adept at building effective relationships with business leaders
• Be able to translate business objectives into information security requirements
Span of control The CISO is responsible for:
• Establishing and maintaining an information security management system (ISMS)
• Defining and managing an information security risk treatment plan
• Monitoring and reviewing the ISMS
Authority level/decision rights The CISO is responsible for implementing and maintaining the information security strategy.

Accountability (and sign-off of important decisions) resides in the function to which the CISO
reports, for example, senior executive management team member or the ISSC.
Delegation rights The CISO should delegate tasks to information security managers and business people.
Escalation path The CISO should escalate key information risk-related issues to his/her direct supervisor and/
or the ISSC.
Source: ISACA®, COBIT® 5 for Information Security, USA, 2012. Reprinted with permission.

6 ISACA JOURNAL VOL 4


they needed to do was tracked, while the senior vulnerabilities in a timely manner. The lesson here is
leadership team owner’s role was to ensure that the clearly to follow up on audit recommendations
organization conformed to the policy. through to their implementation.13

The patch management policy also identified the Equifax Ran Business-Critical Systems
roles and responsibilities for various individuals on Legacy IT With Documented
within their portfolios. The business owner was
Security Risks
informed of the need to patch and was responsible
for approving downtime so the patch could be Equifax faced increased security risk due, in part, to
applied. The system owner was responsible for its complex legacy IT environment. Legacy
applying the patch, and the application owner was technology is both a security issue and a hindrance
then responsible for ensuring the patch was applied to innovation, and legacy systems are tough to
correctly. While roles and responsibilities were secure because they are often extremely difficult to
defined in the policy, there were no official patch, monitor or upgrade. Equifax ran a number of
designees for these roles. Again, this was not an its business-critical systems on legacy
acceptable situation. infrastructure, including the system compromised
by attackers during the 2017 data breach.14
COBIT® 2019 process Deliver, Service and Support
(DSS) includes the management practice DSS05.01 The use of legacy technologies and applications
Protect against malicious software, which requires resulted in a dwindling number of employees with
an organization to implement and maintain knowledge of how to operate and maintain the
preventive detective and corrective measures in aging system. For example, Equifax did not have a
place (especially up-to-date security patches and comprehensive picture of the software used within
virus control) across the enterprise to protect the application. This was a key issue, as the patch
information systems and technology from management policy relied on its employees
malicious software (e.g., ransomware, malware, knowing the source and version of all software
viruses, worms, spyware, spam).12 running on a certain application in order to manually
initiate the patching process.
In addition, COBIT 2019 defines who is responsible
and accountable (figure 3) for each of its key Equifax recognized the risk posed by continued
management practices. Clearly, the message here is operation of its legacy IT systems, had documented
that these roles should be mapped to named some security risk factors and even planned an
individuals in each of our enterprises. upgrade, however, it failed to move quickly enough,
resulting in the breach of the system.
Also noteworthy was the fact that internal audit had
reported issues with the patching process. These Again, COBIT has documented these risk scenarios.
included the failure to patch or remediate Build, Acquire and Implement (BAI) BAI03.10

B. Component: Organizational Structures


Chief Information Security Officer

Information Security Manager


Business Process Owners
Chief Information Officer

Head Human Resources

Head IT Operations
Head Development

Privacy Officer

Key Management Practice


DSS05.01 Protect against malicious software. A R R R R R
Source: ISACA, COBIT® 2019 Framework: Governance and Management Objectives, USA, 2018. Reprinted with permission.

ISACA JOURNAL VOL 4 7


Maintain solutions requires an enterprise to develop 3 US House of Representatives Committee on
and execute on a plan for the maintenance of Oversight and Government Reform, The Equifax
solution and infrastructure components, and to Data Breach, Majority Staff Report, 115th
include periodic reviews against business needs Congress, December 2018, https://republicans-
and operational requirements. Organizations should oversight.house.gov/wp-content/uploads/
also develop and execute on a plan for the 2018/12/Equifax-Report.pdf
maintenance of solution components that includes 4 Ibid., p. 58
periodic reviews against business needs and 5 Ibid., p. 61
operational requirements such as patch 6 ISACA®, COBIT® 5, USA, 2012, www.isaca.org/
management, upgrade strategies, risk, COBIT
vulnerabilities assessment and security 7 Ibid.
requirements (figure 4). 8 Ibid.
9 Putrus, R.; “The Role of the CISO and the Digital
Conclusion Security Landscape,” ISACA® Journal, vol. 2,
2019, https://www.isaca.org/Journal/archives
It has not been my intention to single out Equifax 10 Op cit The Equifax Data Breach, p. 60
and point fingers. Certainly, let he or she who is 11 Ibid., p. 61
without security vulnerabilities cast the first 12 ISACA, COBIT® 2019 Framework: Governance
aspersion. However, in this historical year for ISACA, and Management Objectives, USA, 2018,
I do believe that it is important that we learn from www.isaca.org/COBIT/Pages/COBIT-2019-
what is an excellent report from the US House of Framework-Governance-and-Management-
Representatives. ISACA’s artifacts, especially COBIT, Objectives.aspx
can aid us in doing so and ensure that, in turn, 13 Cooke, I.; “Enhancing the Audit Follow-up
history is kind to us. “Those who cannot remember Process Using COBIT 5,” ISACA Journal,
the past are condemned to repeat it.”15 vol. 6, 2016, https://www.isaca.org/archives
14 Op cit The Equifax Data Breach, p. 71
Endnotes 15 Santayana, G.; The Life of Reason: Reason in
1 Oxford Dictionary, “Artifact,” https://en.oxford Common Sense, Scribner’s, USA, 1905,
dictionaries.com/definition/artefact https://www.iep.utm.edu/santayan/
2 Huxley, A.; Collected Essays, Harper and
Brothers, USA, 1958

Figure 4—COBIT DSS05.01—Protect Against Malware, Organizational Structures


BAI03.10 Maintain solutions. a. Number of demands for maintenance that are not satisfied
Develop and execute a plan for the maintenance of solution and b. Duration of demands for maintenance that are satisfied and that go
infrastructure components. Include periodic reviews against business unsatisfied
needs and operational requirements.
Activities Capability Level
1. Develop and execute a plan for the maintenance of solution components. Include periodic reviews against business needs and 2
operational requirements such as patch management, upgrade strategies, risk, privacy, vulnerabilities assessment and security
requirements.
2. Assess the significance of a proposed maintenance activity on current solution design, functionality and/or business 3
processes. Consider risk, user impact and resource availability. Ensure that business process owners understand the effect of
designating changes as maintenance.
3. In the event of major changes to existing solutions that result in significant change in current designs and/or functionality
and/or business processes, follow the development process used for new systems. For maintenance updates, use the change
management process.
4. Ensure that the pattern and volume of maintenance activities are analyzed periodically for abnormal trends that indicate 4
underlying quality or performance problems, cost/benefit of major upgrade, or replacement in lieu of maintenance.
Source: ISACA, COBIT® 2019 Framework: Governance and Management Objectives, USA, 2018. Reprinted with permission.

8 ISACA JOURNAL VOL 4


INNOVATION
GOVERNANCE

The Balance of Speed and


Protection in Innovation
Organizations embrace innovation in order to that are causing this type of disruption:
outcompete others in their space. The mission in virtualization and the cloud. There is quite a bit that
Do you have
audit is to protect the business. This is done by is not covered herein. For instance, auditors are
something
ensuring controls are in place to minimize the discussing blockchain and the impact of the EU to say about this
impact of negligence, waste and malicious activity. General Data Protection Regulation (GDPR). There article?
When processes begin to accelerate, as they should is also potential risk in implementing the Internet of
with innovation, it is easy for people to focus on Things (IoT) that normally would not be Visit the Journal pages
of the ISACA® website
getting the pressing needs accomplished. This may considered.3 Whatever the emerging technology, the
(www.isaca.org/journal),
mean that they do not think about the types of foundational questions need to be asked for each.
find the article and click
controls that are in place. on the Comments link to
Virtualization share your thoughts.
Also, organizations embracing innovation efforts When organizations had physical servers and
https://bit.ly/2-wptopU
will try to bring together experts across knowledge components, they could maintain “physical” security
areas. This collaboration often allows individuals to in a real sense. One had to get access to the data
understand challenges and opportunities in ways center and then to the specific rack where the asset
they would not on their own. This can lead to that was located. Stakeholders had to be able to touch
competitive edge. However, it also means there will the hardware. With virtualization, this is no longer
be people who may not be familiar with important the case. Physical hosts are still used, but,
controls in a specific area because they may not be depending on if it is an on-premises solution or a
controls with which all stakeholders are used to cloud solution, the actual hardware may or may not
dealing. This is to be expected with innovation. be in close proximity. However, one can be certain
that even if one cannot reach the real box, one can
Auditors have to balance ensuring proper controls touch the virtual machines that are on it.
and maintaining an effort’s momentum. These
types of trade-offs are common in audit and Why does this matter for innovation? In an
security. One good example is the confidentiality, innovation effort, teams are likely trying to do rapid
integrity and availability (CIA) triad, where prototyping. They are looking to accelerate builds.
confidentiality and integrity are often at odds with Virtualized hardware allows them to quickly stand
availability.1 Innovation is no different. up and tear down computing environments. Those
computing environments have just as much risk as
Emerging Technologies and the
Accelerated Cycle K. Brian Kelley, CISA, CSPO, MCSE, Security+
Part of what poses such a great challenge is that a Is an author and columnist focusing primarily on Microsoft SQL Server and
Windows security. He currently serves as a data architect and an
large part of innovation is looking at emerging
independent infrastructure/security architect concentrating on Active
technologies. These differ in key ways from Directory, SQL Server and Windows Server. He has served in a myriad of
traditional IT systems, and controls and processes other positions including senior database administrator, data warehouse
have to change accordingly. Emerging technologies architect, web developer, incident response team lead and project manager.
are a great enough concern, even outside of Kelley has spoken at 24 Hours of PASS, IT/Dev Connections,
innovation, that ISACA® has a dedicated community SQLConnections, the TechnoSecurity and Forensics Investigation
forum for the topic on its Engage Online Forums Conference, the IT GRC Forum, SyntaxCon, and at various SQL Saturdays,
portal.2 It is worthwhile to look at two specific areas Code Camps, and user groups.

ISACA JOURNAL VOL 4 9


to ensure that their systems will perform well, even
under unexpectedly heavy loads.

However, the cloud model changes controls in


fundamental ways. It goes beyond the fact that
organizational processes and data are running on
“someone else’s computer.” How to get audit
information back, what kind of assets can be
brought to bear, how to correlate between on-
premises and cloud information in the event of an
attack are all new challenges.

Then there is the financial side of things, which


does impact IS audit. After all, part of what makes
the cloud so attractive is the ability to spin up new
resources on demand. The traditional model says
normal, non-innovation effort-led environments. If one has to wait for a hardware vendor to have the
organizations are using production data sets, then physical device ready. With the cloud, a request is
they must apply the same rules of protection. And made through a portal or a programming interface
they must do so at the accelerated build-and- and, within minutes, the needed resource is
destroy pace that innovation is likely to foster. available. That also means the cloud provider
begins billing on that resource. Just as the
Cloud efficiency on projects is tracked, this should now be
Just about every major chief information officer looked at in cloud provisioning, especially given that
(CIO) publication touts the cloud as where innovation efforts will most likely take advantage of
innovative organizations should be. As a result, the ease and speed of cloud deployments.
there is a huge push to explore cloud technologies.
This is reasonable. If someone else foots the bill for High-Speed Risk Analysis
maintaining the physical environment for
Because innovation efforts are moving more
computing resources, and that someone can gain
quickly, everything has to speed up, including risk
economy of scale for having a large number of
analysis. When risk analysis is sped up, the
customers, it should be cheaper. Also, most cloud
likelihood of making mistakes or missing
providers have a pay-as-you-go model, meaning
something increases as well. However,
users only pay for the resources they actually use.
organizations should already have the capability to
Therefore, enterprises are not overbuying hardware
make these kinds of decisions quickly. For instance,
incidence response has to do this type of
consideration during an actual security incident.
ANALYSIS MUST BE The reality is that one can move quickly when one
needs to do so. With innovation, that need is real.
STREAMLINED AND THE
RESULTS MUST BE PUT IN A If risk analysis lags behind, it will either get skipped
altogether or the findings will be looked at and
COMMUNICABLE FORMAT someone will likely say, “We will get to this when we
WHEN THEY ARE MOST can.” Too often, “when we can” is a euphemism for
never or until an external auditor or regulator forces
USABLE TO THE PEOPLE the issue. Therefore, analysis must be streamlined
DOING THE WORK. and the results must be put in a communicable
format when they are most usable to the people
doing the work.

10 ISACA JOURNAL VOL 4


Concise Communications If one fails to do any of these things, one may hear
the same thing as if risk analysis is too slow, “We Enjoying
Conciseness is also critical. If things are moving at will get to it when we can.” The same rules tend to
a higher rate of speed, there is less time available to this article?
apply. The earlier one is able to communicate the
digest documents. Typical audit findings and risk controls and show the need, the more likely it is that
analyses have much in the way of explanations, • Learn more
they will get implemented properly.
methodology, and the like because it is important to about, discuss
show how the findings have been proven. However, and collaborate
with an innovation effort, too much of this
Remembering the Bottom Line on remerging
additional documentation impairs the effort. Here is The bottom line is that an organization wants its technology in
where one can take a cue from Agile, which states innovation efforts to better identify real needs and ISACA’s Online
as one of its four values, “working software over products of its market space or for those efforts to Forums.
comprehensive documentation.”4 Here one would forecast new needs and opportunities. Activity that https://engage.
say, “solid understanding of risk over lengthy slows down the achievement of these goals could isaca.org/online
analysis documents.” result in the organization losing its momentum and forums
not achieving its goals ahead of its competitors.
Prototyping Controls Auditors must be mindful of this as they ensure that
the organization is protected. That means
Everything talked about so far leads to this: ensuring considering the implications of new technologies
that proper controls are baked into whatever product, and processes, being able to identify and
offering or process an innovation effort is developing. communicate risk quickly to a wider audience than
Most of the team is going to be focused on what the they are used to, and being active participants in
business wants to accomplish. Here is where an ensuring that controls get implemented as testing
auditor has to manage the team to ensure that, as the and experimentation happens. This is how speed is
team does work, the controls get included. They need balanced with protection.
to be included as the team builds prototypes or
attempts quick builds or tests. Managing the team
requires an auditor to do the following:
Endnotes
1 Infosec, CIA Triad, https://resources.infosec
• Provide documentation on the controls in a
institute.com/cia-triad/
timely manner
2 ISACA®, Engage Online Forums,
• Be available to discuss the “how” and “why” of https://engage.isaca.org/communities/
each control onlineforums
3 Larson, S.; “A Smart Fish Tank Left a Casino
• Have testing, preferably, automated testing,
Vulnerable to Hackers,” CNN.com, 19 July 2017,
ready to go as controls are built in to the product
https://money.cnn.com/2017/07/19/technology/
or offering
fish-tank-hack-darktrace/index.html
• Give specific feedback to fix an issue if a control 4 Beedle, M. et al.; “Manifesto for Agile Software
is not being properly met Development,” Agile Manifesto, 2001,
https://agilemanifesto.org/

ISACA JOURNAL VOL 4 11


THE NETWORK

Honoring Our Past.


Innovating Our Future.
Q: As ISACA’s incoming capability and skill set management, and
chair of the Board of gaps in our industry. governance—so I have a
Directors, how do you see very solid grasp of what
ISACA® growing and There also needs to be a provides value to our
adapting to the constantly focus on making ISACA existing and future
more relevant and membership and the
changing marketplace and
valuable than ever to the challenges that they face
needs of its constituents
constituents that we every day.
over the next year?
serve—members,
chapters, enterprises, Q: What do you see as
A: We have a number of partners, government the biggest risk factors
areas on which to focus, and industry. being addressed by IT
including preparing ISACA security professionals?
constituents for the future How can organizations
Q: What in your past
and Industry 4.0. Engaging protect themselves?
experience has best
more enterprises and
prepared you for this
helping them understand the
position on the ISACA® A: The speed at which
value that ISACA brings to
Board? our business customers
the industry, their
are operating because
businesses and their
A: My executive they must. The IT
employees, which will, in
experience at global organizations that we
turn, help our members, is
technology, services and partner with are working
also a priority.
consulting companies with business partners
has provided me with the who are driving
I believe ISACA has an significant and critical
opportunity to interface
important role to play in digital transformation
with various industry
helping enterprises address
Brennan P. Baybeck, CISA, CRISC, CISM, leaders, board members, activities to compete and,
big challenges such as IT in some cases, to survive.
CISSP governance, data governance
executive teams and,
Is chair of ISACA’s Board of Directors and vice most importantly, When businesses are
and cybersecurity, which are aggressively looking to
president of Security Risk Management for Global thousands of customers
more important than ever, as dominate or struggling to
Customer Support Services at Oracle Corporation. across the world, giving
organizations drive digital survive, they are willing to
In his role, Baybeck leads a global team that me great perspective and
transformation focused on accept risk that they may
addresses IT security risk management for one of insight on how
adding value as quickly as not have in the past.
the largest lines of business at Oracle. He is also businesses strategize,
possible to business using These decisions are
responsible for leading security, privacy and innovate and operate on
technology. We must also creating new and
availability for customer-facing services, as well as a daily basis. These
embrace the future of significant security and IT
Global IT’s key enterprise IT services, including experiences have allowed
learning and knowledge
cloud initiatives. He has more than 25 years of me to observe customer risk challenges and, many
experience in IT security, governance, risk, audit platforms. times, these decisions
successes and how they
and consulting, and has worked in various achieved those are not informed, risk-
industries designing, implementing and operating ISACA is in a unique position successes, as well as based decisions.
enterprisewide programs to address global security to really make people aware their challenges and how
risk. He has held leadership positions at Sun of the diversity challenges they have overcome them Many of us may have
Microsystems, StorageTek and Qwest we have in the IT field. We (or not, which creates traditionally focused on
Communications, and served as an information have an opportunity to not opportunities for ISACA). operational roles, which
security risk consulting director for several years. only bring knowledge and are important, but a real
Baybeck also has been actively involved with understanding to this need of boards and
I have worked in roles
ISACA® for more than 25 years, serving many years important challenge but also executives is in the area
directly related to the
as a chapter board leader and more than eight to be at the forefront of of governance. In my
areas that we serve for
years working at the international level as chair for addressing this issue while experience, a properly
almost my entire career—
various working groups and as a Board director. helping solve the real informed board of
cyber and information
business challenge of directors or teams of
security, IT audit, risk

12 ISACA JOURNAL VOL 4


1  What is the biggest security challenge being
faced in 2019? How should it be addressed?
Data governance and protection. It has always been
around, but some recent high-profile cases are
senior executives always make sure the pendulum technologies will be a
bringing it to the forefront. Addressing it requires
make the right decision does not swing too far one critical component in
for the business. way or the other. automating mundane but
a top-down, executive-sponsored approach vs.
necessary security tasks trying to solve it simply with technology or from the
Q: You have extensive Q: What do you think are and freeing up our most tactical level.
experience in executive the most effective ways valuable security
leadership. How do you
see the role of executives
to address the
cybersecurity skills gap?
resources to do the most
critical work. 2  What are your three goals for 2019?
changing to meet the • Capitalize and execute on strategic decisions and
challenges of A: Organizations need to Q: What has been your investments to expand ISACA’s presence into the
information security? think out of the box. Many biggest workplace or enterprise, emerging markets and
are still hiring using career challenge and government/public affairs
A: My experience has legacy models focused how did you face it? • Support and drive diversity initiatives
shown that executives are on very specific skill sets • Help ISACA’s new chief executive officer (CEO)
more informed about and capabilities. The truth A: A lesson that I learned and his executive team be successful while
information security than is that there are not a long time ago was
strategically preparing ISACA for the future
ever, including at the board enough of those assuming that my
level. However, even “traditional” people to go managers knew what my
though this is positive
progress, we still have a
around, so the more
successful organizations
professional goals and
objectives were and they 3  What industry-related sources do you read on a
regular basis?
long way to go. I am are looking at other skill were magically going to • ISACA’s knowledge resources
starting to see that sets, capabilities and, make those happen for • InformationWeek Dark Reading
security is no longer the more important, other me. It was a tough
number-one priority, demographic groups to lesson to learn, as it
mainly due to the various
business transformation
fulfill their cybersecurity
needs.
caused me to miss a
great opportunity for a
4  What is your favorite benefit of your ISACA
membership?
The leadership, professional and personal
activities with which promotion, but I learned development opportunities that ISACA provides to
security is competing. Organizations need to it early in my career.
its members
When you think about it, it strongly consider What I learned is that
makes sense. If the leveraging partners. those managers wanted
business does not
transform, it will no longer
Savvy organizations are
coming up with creative
to help me, but they did
not know what I wanted 5  What is your number-one piece of advice for IT
security professionals?
Always be curious, ask a lot of questions and, most
exist and its security will ways to integrate or that I needed their
not matter. However, technology and services help. You have to be in important, be a life-long learner. The security field is
information security risk partners into their charge of your own constantly changing, so being a lifelong learner
factors continue to grow cybersecurity strategies destiny when it comes to drives new ways of thinking, fresh perspectives,
due to those digital and better utilize your career. There are a creativity, innovation, a solid grounding, and, of
transformation activities. capabilities in those lot of people out there course, helps keep your mind young.
That being said, the technologies to do more who will help you and
biggest challenge for
boards and executive
leadership will be
with less. more resources than you
could ever effectively use
in a lifetime, but it is up
6  What do you do when you are not at work?
Automation, automation, I am an avid outdoorsman and love to do anything
determining what is the automation. This will be a to you to take the time to outdoors. I love to share my passion for the outdoors
proper balance of security critical component of plan your career by
with my wife and my two awesome kids. My favorite
risk vs. business risk. Yes, addressing the creating professional and
activities are fly-fishing and bird hunting, both of which
this is a challenge that has cybersecurity skills gap. personal objectives;
been around for a long identifying the people,
involve being outdoors in some of the most rugged,
Emerging technologies
time, but I think it is experiences and beautiful and peaceful places in the world.
are already transforming
becoming more critical as the way we handle resources that can help
security risk factors security risk and meet those objectives;
compete against business operations management and then proactively
risk. Executives need to today. These executing on that plan.

ISACA JOURNAL VOL 4 13


FEATURE

The Pain of Automation


Internal Audit Functions Face Real-World Challenges
Amid Optimistic Environment
organization planned to modernize its compliance
Disponible également en français function in the year ahead.1However, according to
Do you have
www.isaca.org/currentissue another study, just 14 percent of internal audit
something
to say about this functions could be considered advanced in their
article? Internal audit leaders are looking at automation technology adoption (including the use of robotic
technologies for many of the same reasons as process automation [RPA] to expand the expediency
Visit the Journal pages and coverage of their audits), while 83 percent are
of the ISACA® website business management. Automated processes can run
in the background, allowing auditors to look at more either adopting advanced technologies at a slower
(www.isaca.org/journal),
things in less time than they could manually. Also, pace or not at all.2
find the article and click
on the Comments link to deviations from expected or acceptable results can be
share your thoughts. brought to auditors’ attention more quickly (in near- These findings suggest that, in spite of the
real time) than with periodic manual review. promised benefits of automation, internal audit
https://bit.ly/30MqZDL
Advantages such as continuous monitoring, departments are encountering hurdles on the path
automation of repetitive processes and the ability to toward realizing those benefits. Three of the key
audit large populations (as opposed to sampling) offer hurdles that almost any internal audit function will
internal audit departments the opportunity to expand come up against are choosing the right processes
their view, do more with limited resources and, most to automate, getting the solution (i.e., software)
important, provide greater value to the enterprise. developed and navigating the complex ways in
which automated internal audit processes interact
In light of these possibilities, optimism around with other areas of the business.
automation in internal audit is understandably high.
In a recent survey, nearly half of US risk and Process Identification and Selection
compliance professionals, internal auditors,
One of the fundamental challenges internal audit
executives and board members surveyed said their
departments face in implementing RPA is choosing
the process, or processes, to be automated. It is not
Wade Cassels, CISA, CFE, CIA always obvious what the department should focus
Is a senior IT auditor at Nielsen. He supports Nielsen’s IT general controls on or prioritize.
external audit engagement and the audit reporting and communications
functions for Nielsen Internal Audit.
For example, applying a risk-based approach might
point toward investing resources in developing RPA
Jane Traub, CCSA, CIA based on the areas of greatest risk to the
Is an internal audit director at Nielsen. She leads internal audit automation
organization. If the internal auditors are looking at
initiatives, manages audit engagements for the Global Media team and
supports compliance with the code of conduct. an area of critical risk, so the thinking goes, then
they want to maximize the effectiveness of the
Kevin Alvero, CISA, CFE audit processes they are using to perform that role.
Is a senior vice president of internal audit, compliance and governance at
Nielsen. He leads Nielsen’s internal quality audit program and its industry On the other hand, some audit functions would rather
standards compliance initiatives, spanning the company’s Global Media focus their automation efforts on those audit
products and services. processes that have the greatest potential for
efficiency within the internal audit function. In this line
Jessica Fernandez, CISA of thinking, if automation efforts focus on automating
Is an internal audit vice president at Nielsen. She leads all internal and the least valuable and/or least efficient processes to
external audit engagements around Nielsen’s Digital and Advanced TV free up auditor capacity, it allows the department to
products and services.
do more across the board with finite resources.

14 ISACA JOURNAL VOL 4


Further complicating the choices is the fact the
internal audit department may not be solely
responsible for making the selection. If the IF AUTOMATION EFFORTS FOCUS ON
department is participating in a larger, organization-
AUTOMATING THE LEAST VALUABLE AND/OR
scale automation initiative, people outside the
department may have a say in what processes are LEAST EFFICIENT PROCESSES TO FREE UP
chosen for automation.
AUDITOR CAPACITY, IT ALLOWS THE
Even if the organization has a well-conceived DEPARTMENT TO DO MORE ACROSS THE
system in place to select processes for automation,
BOARD WITH FINITE RESOURCES.
a good set of performance measures is also
needed to inform that system and accurately
assess which processes will have the greatest
return on investment (ROI). Many organizations do help them adopt new capabilities to deliver value to
not have sufficient performance data, and that can the organization that they could not previously.
lead to the risk of automating the wrong things.3
Most likely, though, the decision is going to come Whether looking at new or existing processes,
down to money saved. This is important for internal internal audit departments that are trying to build
audit departments seeking funding and support for momentum on the path toward automation should
automation efforts. The better they can make the look for a process that:
ROI case and quantify the benefits of automation in
• Has a clearly definable ROI
terms of cost savings, the easier it will be to justify
their selection of processes to automate. • Relates to an area of key business risk to the
organization
In addition to ROI potential, the process in question
• Has reliable, quality inputs
must have reliable, quality input. The quality and
reliability of the data input into an automated • Is labor intensive, subject to human error and
process is the single greatest determinant of generally inefficient
whether users will be able to trust its output.4
These are the areas internal audit should target first,
Many internal audit functions will look at the and formalized RPA projects should focus on a
processes they currently perform and choose limited number of high-impact targets to preserve
automation for those that RPA can help them do momentum.6
better. However, this is not necessarily the best
approach. Audit functions can fall into the trap of Solution Development
simply retrofitting old procedures with new
Even though a process may be an ideal candidate
technology to make them incrementally better.5
for RPA in theory, actually developing the
Ideally, audit functions should look at how RPA can
technology to automate it can present numerous

Speaking the Same Language


When it comes to artificial intelligence (AI) and robotic process automation (RPA), one of the key hurdles
for internal audit departments to overcome is simply making sure everyone is aligned in terms of what it
is they are talking about. AI, in simple terms, involves a program that takes data patterns and learns from
them to make informed decisions based on learned rules. An example would be suggestions for items to
buy from a website that is used regularly for purchases by a consumer. People may be prompted by a
message such as “You might also like…” This concept extends to the business world, where established
patterns of business processes can apply AI to predict future behavior and note exceptions to anticipated
behavior of systems or people. RPA, by contrast, is often used where a process does not need decision-
making to execute. It uses software programs, often called “bots,” that mimic a human’s behavior such as
sequential steps in data collection; report issuance; or any repetitive, systematic, rule-based process.

ISACA JOURNAL VOL 4 15


of the aspects of third-party risk management,
including service level agreement (SLA) and
security/confidentiality, come into play. In particular,
ongoing updates and maintenance will be tied to
the vendor solution going forward, and it may not be
feasible to bring these in-house once a customized
automation process is established by the vendor; so
the internal audit department should understand the
ongoing requirements just as well as the upfront
ones. Plus, the internal audit department must
ensure that needs are accurately defined and scope
is carefully managed to avoid implementing a more
powerful and, thereby costly, solution than is
absolutely necessary. Weighing and balancing
these trade-offs is important to do prior to
challenges and choices. Presuming the internal committing to a course of action for automation.
audit staff typically does not retain the expertise to
write bots and develop software, these services will RPA experts insist that robots do not make
have to come from within the organization’s mistakes and, if they are programmed correctly, RPA
IT/engineering staff or from an external vendor. technologies have great potential to save auditors’
Each presents its own challenges. time through the automation of routine, repetitive,
rule-based actions. However, if they are
For example, when leveraging engineering programmed incorrectly or incompletely or are
resources from within their own organization, altered, errors can be introduced during the
internal audit departments may find themselves at automated process. These process automation
the mercy of the enterprise’s larger technology errors can perpetuate larger, systematic errors to a
development pipeline. The way this pipeline is greater degree than similar manual processes.
prioritized can have a big impact on the progress of Therefore, whether the solution is being developed
internal audit’s automation initiatives, particularly if in-house or by a vendor, correct documentation of
the engineering resources are subject to top-down each step and rule in the processes to be
pressure to push lower profile (or non-client-facing) automated and verification of bot functionality must
projects down the list. be performed before implementation of RPA, and it
is important to understand the demands this will
Conversely, when the internal audit department place on internal audit resources before the solution
utilizes a vendor to create automation solutions, all development process begins.

Throughout the solution development process,


internal audit automation leaders should also
THROUGHOUT THE remain aware of their alternatives. A fully
SOLUTION DEVELOPMENT customized, fully automated solution may, in fact,
not be the ideal solution for every automation
PROCESS, INTERNAL AUDIT project. For example, if 80 percent of the process in
AUTOMATION LEADERS question can be automated fairly easily, but the
remaining 20 percent would come at a high relative
SHOULD ALSO REMAIN cost, then automating the 80 percent may be the
AWARE OF THEIR ideal solution for the department’s needs.7 Indeed,
full automation can be undesirable based on the
ALTERNATIVES. application. Processes that involve decisions that
humans need to make are not suited to total

16 ISACA JOURNAL VOL 4


automation.8 RPA is not the only mode of process. Templates and completed examples are
automation, either. Replacing legacy systems or also useful ways to smooth the discovery and Enjoying
building powerful application programming evaluation phases of potential automation projects.
this article?
interfaces (APIs) into legacy systems may allow Before coding, technical review by those
organizations to automate processes with less responsible for writing the actual programming
• Read Audit
effort than building RPA solutions, and those code is also a necessary input. Having dedicated
Outlook: Intelligent
leading automation efforts should avoid fixating on outreach staff for organizationwide automation
Automation.
RPA alone for automation. initiatives is also helpful for disseminating
www.isaca.org/
information about what RPA can and cannot do for
audit-outlook-
Finally, the solution development process should enterprise teams.
intelligent-
not be cordoned off from the internal audit staff and
automation
restricted to the technology experts who are writing Process Interactions • Learn more about,
software. It is critical that internal audit
Evaluating a process for automation on its own discuss and
departments integrate the intended users of the
merits can be complex enough, but it is often collaborate on
solution into the development process and train
compounded by interaction with other areas. Robots audit and
them because, for one thing, a person has to be
(in the RPA context) are entirely technology agnostic assurance ISACA’s
able to evaluate when an automated output is
and can be used with any application, so they can Online Forums.
wrong.9 The audit functions most advanced in their
work across functions and across applications.11 https://engage.
use of technology are developing their people and
isaca.org/online
processes at the same time.10 Not only should
forums
people be trained on how to utilize an RPA solution,
it is also critical that they understand the benefits EVALUATING A
from a strategic perspective. If these are not
explained properly, the concept can generate PROCESS FOR
anxiety (e.g., Will these software robots be taking AUTOMATION ON ITS OWN
away our jobs?). These concerns can contribute to
inertia for launching RPA projects. In any MERITS CAN BE COMPLEX
automation effort, the benefits of less time spent on ENOUGH, BUT IT IS OFTEN
tedious, repetitive tasks and freeing up staff time to
focus on more value-added activities should be COMPOUNDED BY
communicated early and often to all stakeholders. INTERACTION WITH OTHER
Garbage In, Garbage Out AREAS.
While internal audit departments generally do not
have the expertise to develop technology solutions
in-house, they still play a critical role in the ultimate However, a process’s interactions may not be purely
success of an automation solution based on how technological. For example, considerations must be
well they educate the software developers about made for legal and regulatory compliance. At one
their needs and objectives throughout the project, internal audit shop, the team was motivated to work
not just at the beginning. The usefulness of a toward automating a process that consisted of
technology solution will directly correlate to the collecting field audit data manually on paper forms.
ability of the business process owners and subject As they set about developing an electronic form
matter experts to explain, step-by-step, how a that could be completed on a tablet device and then
process is conducted, from end to end. If the uploaded to a cloud storage drive where the
internal audit department does not take care to structured data could be used for enhanced
articulate its needs thoroughly and accurately, then analysis, they encountered a roadblock when they
the resulting technology solution will not succeed. discovered that their plan conflicted with the
Screenshots and/or screen video recordings of organization’s policy prohibiting the transmission of
staff performing the actions can be helpful in this personally identifiable information (PII) on the cloud

ISACA JOURNAL VOL 4 17


storage drive, and alternative approaches had to be automate should carefully consider benefits, risk
considered. and trade-offs. While many processes can be
automated, there must be a disciplined prioritization
Another aspect of process interaction is that if process to choose which should be automated to
internal audit departments are seeking to automate make these efforts worthwhile.
processes related to specific areas of the
enterprise’s business, then they must consider the Endnotes
risk of those solutions becoming obsolete if the
business changes. When the business changes, the 1 Salierno, D.; “Tech Adoption Falls Short,”
people on the internal audit staff can be assigned to Internal Auditor, vol. 75, iss. 5, October 2018,
go audit something else, but repurposing a p.11-12
technology solution designed to perform one task 2 PricewaterhouseCoopers, “2018 State of the
and having it perform another may not be as Internal Audit Profession Study,”
straightforward. This means that internal audit https://www.pwc.com/sg/en/publications/
functions should have alignment with business state-of-internal-audit-profession-study-2018.html
management regarding strategy before pursuing 3 Ramamurthy, R.; “RPA—Five Biggest Hurdles
automation initiatives that are tied to the internal and How to Overcome Them,” LinkedIn.com,
audit of a particular area of business. 17 April 2017, https://www.linkedin.com/
pulse/rpa-five-biggest-hurdles-how-overcome-
them-ravi-ramamurthy/
Conclusion
4 McCollum, T.; “Audit in an Age of Intelligent
The potential benefits of automation to internal Machines,” Internal Auditor, December 2017
audit are real and well documented. Just as real, but 5 PricewaterhouseCoopers, “Revolution Not
perhaps less well documented, are the hurdles Evolution: Breaking Through Internal Audit
internal audit departments are facing on their way Analytics’ Arrested Development,” January
to realizing the benefits of automation. 2018, https://www.pwc.com/us/en/services/
risk-assurance/library/internalauditanalytics
Success begins with choosing the right process to revolution.html
automate and continues with the meticulous 6 Applied AI Blog, “14 RPA Pitfalls and the
documentation and mapping of the current process Checklist for Avoiding Them [2019 Update],”
and defining the requirements of the automation 31 December 2018, https://blog.appliedai.com/
technology to ensure that it works and meets the rpa-pitfalls/
needs of the users. Beyond basic user testing, users 7 Ibid.
should be integrated into the solution development 8 Shacklett, M.; “Business Process Automation:
process so they not only understand how to use the Where It Works, and Where It Doesn’t,”
tool, but also its strategic benefits and the potential ZDnet.com, 3 August 2015, https://www.zdnet.
impact of malfunction. Finally, the broader com/article/business-process-automation-
interactions of the process to be automated should where-it-works-and-where-it-doesnt/
be considered to avoid surprises down the road. 9 Op cit McCollum
10 Campbell, J.; “Intelligent Automation/RPA and
With careful planning and evaluation, automation Use for Internal Controls,” IIA Florida West
solutions using tools such as RPA have the Coast Chapter and West Florida ISACA Chapter
potential to streamline audit and business Fraud and Security Seminar, 6 December 2018
processes and make monitoring of controls more 11 Ibid.
efficient. Decisions about what processes to

18 ISACA JOURNAL VOL 4


FEATURE

Acknowledging Humanity in the


Governance of Emerging Technology
and Digital Transformation
The Risk Domain of IT Governance
Disponible également en français
The risk factors involved in the deployment of any Do you have
www.isaca.org/currentissue information technology are numerous. Concerns something
include navigating the complexity of the integration to say about this
Artificial intelligence (AI) and robotics have demanded between the new technology and the article?
captured the imagination of humans. A quick legacy systems, omnipresent data challenges, Visit the Journal pages
search for AI and robotics in pop culture finds that it questions about the nature of the security of the of the ISACA® website
stretches back to Mary Shelley’s book, Frankenstein, new system relative to the existing information (www.isaca.org/journal),
first published 201 years ago, and extends to cult security paradigm, and the existence of operational find the article and click
classics in television and film such as 2001:A Space gaps requiring the integration and development of on the Comments link to
Odyssey, Star Trek, Wargames, Hitchhiker’s Guide to new supporting IT and business processes. share your thoughts.
the Galaxy, Tron, The Matrix, Ex Machina and more.
https://bit.ly/2I2R74J
There is also the variety of vendor risk, especially if
Depending on how one defines AI, it has certainly the vendor has a desirable technology, but either or
had its ups and downs since 1956.1 Approximately both the technology and the vendor are relatively
30 years ago, AI activity was at a peak, with a strong
interest in languages such as Prolog. Interest in AI
waned soon thereafter, only to come back stronger
in the 21st century. Prolog is still regarded as one of
the best languages for AI programming.2

AI is, however, but one class of emerging


technologies that are being touted as instrumental
for digital transformation. However, many emerging
technologies are not IT-related (e.g., lab-grown
meat), and only a handful are expected to be
effective at enabling organizations to outperform
their peers. In this respect, the analysis of more
than 250 emerging technologies identified the eight
technologies most likely to change the way
Guy Pearce, CGEIT
Has served on various enterprise boards and as chief executive officer of a
organizations do business: AI, augmented reality,
multinational retail credit operation. This experience provides him with rich
blockchain, drones, Internet of Things (IoT), insights into the real-world expectations of governance, risk, IT and data.
robotics, virtual reality and 3D printing (figure 1).3 Capitalizing on two decades of corporate digital transformation experience,
he instructs a digital transformation course at the University of Toronto
Amid this excitement, the question for IT (Ontario, Canada) School of Continuing Studies, targeting boards and the C-
governance practitioners is whether they are well suite, based on a gap he identified while researching a recent article
enough prepared to appropriately govern emerging published in the ISACA® Journal. He serves as an independent consultant in
technologies and their contributions to digital enterprise digital transformation and is the recipient of the 2019 ISACA
Michael Cangemi Best Book/Author Award.
transformation. The short answer? Perhaps not.

ISACA JOURNAL VOL 4 19


Figure 1—The Eight Emerging Technologies Most Likely to Change the Way Organizations
Enjoying Do Business Constitute but a Fraction of the Emerging Technology Landscape
this article?
• Read Enforcing
Data Privacy in Al
the Digital Internet of Things
World.
www.isaca.org/ Drones
enforcing-data- Robotics
privacy
• Learn more 3D Printing
about, discuss Augmented/Virtual Reality
and collaborate
on emerging Blockchain
technology in Other Emerging Technologies
ISACA’s Online
Forums.
https://engage.
isaca.org/online
forums

unproven. And one should not forget the business so significant that the global financial services
case risk, i.e., the uncertainty in terms of whether regulatory agency, the Financial Stability Board
the technology will eventually realize the business (FSB), has been explicit about the role of culture
benefits being proposed of it—a risk amplified by (the set of human behaviors and norms that an
emerging technology. organization finds acceptable) in establishing
effective risk management, being the first regulatory
The accelerated rate of privacy concerns and privacy agency to do so. In particular, the FSB speaks of
regulations globally raises more compliance risk and setting the appropriate tone at the top; in other
even more questions, with a further rapidly emerging words, that the organization’s leadership sets a
issue concerning the ethical use of technology and/or behavioral example for the organization to follow.
its data, especially in AI applications.
There is increasing recognition that culture is
These risk factors and issues are compounded for integral to absolutely everything. Some have
emerging digital technologies because the referred to the tone at the top as “the first ingredient
unknowns associated with emerging technologies in a world-class ethics and compliance program.”4 It
are greater than those of mature technologies. The is little wonder that the concept is the subject of
requirements for the appropriate oversight of digital international attention, even becoming the subject
transformation and emerging technologies of corporate governance codes such as South
intensifies the already demanding requirements for Africa’s King IV.5 Without a determined tone at the
good risk management knowledge, risk top, ethics and cultural initiatives lose their impact.
management experience and risk management What is the impact of ethics and integrity programs
instincts in today’s IT governance professionals. in organizations where “more and more CEOs [are]
leaving their role amid accusations of ethics
Culture’s Role in Effective IT Governance breaches and lack of integrity?”6
Has Been Established
On a related note, corporate culture has been found
As complex as the previously mentioned risk to be the most significant critical success factor
factors are, they are still much easier to manage (CSF) for effective enterprise IT governance.7
than are any human factors. The human factors are Furthermore, International Organization for

20 ISACA JOURNAL VOL 4


Standardization (ISO)/International Electrotechnical supported its misguided endeavors (setting an
Commission (IEC) standard ISO/IEC 38500—a key unethical tone at the top), while Amazon seems to
IT governance framework—specifically warns not to have suffered the problem plaguing many AI
underestimate the human element.8 Understanding initiatives, that of unconscious bias.13
the organization’s personality traits—its culture—is
key to establishing IT effective governance.9

As critical as culture has been found to be, it is but


ETHICS CAN EMERGE
one important component of the human element of AS AN ISSUE WHENEVER
both effective risk management and effective IT
governance. The other important component is
TECHNOLOGY—NOT JUST
ethics, a field of study that assesses the morality of INFORMATION
the organization’s behaviors.
TECHNOLOGY OR NEW
Where Culture and Ethics Collide TECHNOLOGY—IS
The difference between culture and ethics can be INTRODUCED.
demonstrated by means of the recent Volkswagen
emissions scandal, where the global automaker
deemed the behavior of designing software to cheat Volkswagen is not alone in being consciously
the US’s diesel emission standards as being unethical. Companies like Facebook have been
acceptable.10 Ethics is concerned with the morality implicated in fake and incendiary news designed to
of solving the diesel emissions problem by be divisive, with its chief executive officer (CEO)
cheating. That Volkswagen was consciously offering only that he would make it harder for such
unethical is the root of the scandal. manipulation to occur in the future. Other examples
of being consciously unethical include very large
For an emerging information technology example, organizations producing “unambiguously harmful
Amazon has, since 2014, had a software tool that products” (Monsanto), fake bank accounts (Wells
analyzes job applicants’ résumés to facilitate the Fargo) or inflating medical costs (Cigna).14 The
identification of the best candidates for a role. So scale of these matters demonstrates the extent to
far, so good, as pretty much all large-scale recruiters which the culture of the organization condoned
scan résumés for keywords, even though their tools such activities.
might not be as sophisticated as having an AI
engine. A problem emerged when Amazon’s AI tool There are growing concerns about the ethical
was found to discriminate against women.11 implications of developments of digital
transformation and emerging technologies such as
The ethical issue for Amazon is not the culture and AI, not only from the public, but also from
behavior of algorithmically identifying potentially technology organizations and lawmakers.15
the best candidates for a role, but rather that the
data used to train machine learning models
Ethics: IT Governance’s Next Frontier?
contains biases that humans may not even be
aware of, a matter of being unconsciously Ethics can emerge as an issue whenever
unethical. In fact, a recent headline notes that AI is technology—not just information technology or new
plagued by human bias.12 technology—is introduced. The conversation
extends beyond the technologies to the data they
The ethics question is, therefore, what needs to be produce, which raises all manner of security and
done to protect people against unconscious or privacy concerns. The concerns involve not only
conscious biases as tomorrow’s thinking machines hardware, e.g., IoT visual sensors (cameras), but the
are created, which may be the root of their own software, too, e.g., analytics practices. It has been
ethical dilemma in some circles. The difference argued that the production, access to and control of
between Volkswagen and Amazon in these information will be at the heart of ethical issues in
examples is that Volkswagen knew about and IT.16 This is true not only in the private sector, but in

ISACA JOURNAL VOL 4 21


community on the Toronto waterfront,25 where the
development expects all vehicles to be autonomous
THERE ARE AN INCREASING NUMBER and shared, while robots will perform menial
chores.26 Controversy ignited when globally
OF IMPORTANT QUESTIONS BEING ASKED
renowned former Canadian privacy commissioner
ABOUT THE APPROPRIATENESS OF THE Ann Cavoukian resigned from her role as a
consultant to Sidewalk Labs, “to make a strong
USE OF EMERGING TECHNOLOGY IN
statement”27 on discovering that Sidewalk Labs
SOCIETY. would not guarantee that everyone on the project
would de-identify the data at source as she had
originally been told, only that de-identification would
the public sector as well. In the case of the latter, be encouraged, a state of affairs she described as
the challenge is managing the community “not good enough.”28
expectations and perceptions about fairness; in
other words, ethics by design.17 While it is incidental that both these examples
involved Google or allied companies, the issue
Ethics as a subject is growing in stature in IT because illustrated by them is that there are an increasing
emerging technologies have given people more number of important questions being asked about
power to act, resulting in people having to make the appropriateness of the use of emerging
choices that they did not have to make before. While technology in society, exactly the kind of ethics
people were previously implicitly constrained by their questions that those accountable for the oversight
lack of knowledge or capability, they now have to be of their organizations should be asking.
voluntarily constrained by their ethics.18
Just because new technologies—such as some
The most significant of the many reasons cited for applications of AI—may be more efficient, it does not
the failure of the US$1,500 Google Glass earlier this necessarily make them morally better.29, 30 This idea—
decade was privacy concerns,19, 20 where it was potentially 500 years in the making—identifies that
feasible that someone could be the subject of a while AI has the potential to increase productivity,
wearer taking unwelcome video or photos.21 “Creepy” reduce poverty and boost affluence, it can also make
was used as an adjective to describe the product.22 society worse off if the wrong choices are made.31
The World Economic Forum raises nine categories of
Of all the articles citing numerous reasons for the ethical and risk consequences related to the
failure of Google Glass, one of the most telling is an efficiencies introduced by AI:32
article titled, “Google Glass Wasn’t a Failure. It
Raised Crucial Concerns,”23 where the author argued
• Unemployment brought about by increased
automation (efficiency)
that Glass’s failure was not so much a failure of the
product as it was a victory for human beings, who • Inequality through a new form of the
are increasingly discovering that there are limits to concentration of power in AI organizations
where technology should play a role in human lives.
Privacy was immediately raised as a serious
• Humanity, specifically how machines affect
human behavior and interaction
concern—not marketing, not value propositions, not
product design, etc.—but privacy.24 The other • Artificial stupidity and guarding against
reasons for failure discussed in marketing schools unintended consequences (risk)
today came only much later.
• Racist robots and other biases

In Toronto, Canada, a current tech controversy • Security and protecting against technologies
concerns what Sidewalk Labs—a subsidiary of being used for bad
Alphabet, just like Google, YouTube and Google X
are—is really up to in its desire to create a
• The unforeseen consequences of AI-driven
automation
hyperefficient sensor (and, therefore, data-driven)

22 ISACA JOURNAL VOL 4


• Singularity, when humans are no longer the most
intelligent beings on Earth
THERE DO NOT SEEM TO
• Robot rights and the growing conversation of the
legal status of intelligent robots BE CLEAR GUIDELINES ON
WHAT ACTUALLY
Privacy should also be a candidate for this list.
For now, the top ethical principles proposed for CONSTITUTES THE ETHICAL
digital transformation across a variety of
GOVERNANCE OF DIGITAL
technologies are:33
TRANSFORMATION AND
• Explicitly designing for privacy, security and
integrity—Regulations such as the EU General EMERGING TECHNOLOGIES
Data Protection Regulation (GDPR) have this
SUCH AS AI.
covered through clauses on data security and
data privacy by design, with a paragraph on
accuracy representing integrity.
A Gap in GEIT Coverage?
• Promoting trust—There is quite a long way to go
based on the examples used in this section. Emerging technology and digital transformation
exert new pressures on IT while in pursuit of
• Acknowledging and addressing the kinds of (ethically) increasing organizational
biases raised earlier—The issue at stake is competitiveness and sustainability. The ISACA®
individual or community confirmation bias, CGEIT Review Manual speaks of five governance of
subconscious frames-of-reference that influence enterprise IT (GEIT) domains shown in figure 2.
how people gather, interpret and act on data about
the world, as illustrated by the Amazon example. The topics of ethics and culture contained within
GEIT’s resourcing domain are enterprise constructs,
Ultimately, those who interact with a digitally as are GEIT’s other domains. Should they not,
transformed organizational ecosystem will expect therefore, constitute a domain in their own right?
much more in terms of transparency and fairness Culture and ethics impact the entire organization,
from those organizations.34 just as strategic alignment, business cases, and risk
and resourcing do.
There is a call for the stronger oversight
(governance) of AI to protect against the unethical “Good governance is part of ethics.”37 In other
uses of technology.35 Are IT governance words, ethics does not apply to just a portion of
practitioners prepared for this level of oversight? good governance, as suggested by the current
Again, perhaps not, because there do not seem to positioning of ethics and culture within the GEIT
be clear guidelines on what actually constitutes the resourcing domain, but to all governance. More so,
ethical governance of digital transformation and compliance ethics and culture were found to
emerging technologies such as AI, at least not in empirically influence the level of IT governance (all
the same way that the CGEIT Review Manual is of IT governance),38 not the other way around.
definitive about IT governance frameworks,
strategic alignment, business cases, risk and
Conclusion
resourcing. In particular, is there an IT governance
construct that guides people with respect to Because ethical dilemmas exist wherever humans,
assessing the impact of emerging technology such information and information systems interact,39
as AI on, for example, the organization’s honesty, “[t]he future of the computing profession depends
transparency, accountability, responsibility, on both technical and ethical excellence.”40
independence, fairness and social responsibility?36

ISACA JOURNAL VOL 4 23


In addition to the ethics concerns covered 4 Mohlenkamp, M.; “The First Ingredient in a
previously, issues such as privacy, bias, lack of World-Class Ethics and Compliance Program,”
transparency and biotechnology were only briefly Deloitte Perspectives, https://www2.deloitte.com/
raised, and there are a host of other IT ethics issues us/en/pages/risk/articles/tone-at-the-top-the-
in areas such as cybersecurity, copyright first-ingredient-in-a-world-class-ethics-and-
infringement and plagiarism, and even in terms of compliance-program.html
the digital divide. 5 Ibid.
6 Atkins, B.; “Business Ethics and Integrity: It
Ethics and culture are significant constructs in the Starts With the Tone at the Top,” 7 February
context of today’s information technology. Ethics 2019, Forbes, https://www.forbes.com/sites/
and culture, just like strategic alignment, business betsyatkins/2019/02/07/business-ethics-
case, and risk and resourcing are all enterprise-level and-integrity-it-starts-with-the-tone-at-the-
GEIT constructs that should, perhaps, be performed top/#3839d0a457c6
with the same level of diligence. It seems that the 7 Pearce, G.; “The Sheer Gravity of Underestimating
risk of seeing IT ethics and culture only through the Culture as an IT Governance Risk,” ISACA®
tiny lens of the resourcing domain are too great. Journal, vol. 3, 2019, https://www.isaca.org/
archives
Endnotes 8 Robinson, N.; “Organizational Profiling:
A Path to Effective IT Governance,” Cutter IT
1 Crevier, D.; AI: The Tumultuous Search for Journal, vol. 22, no. 12, January 2010,
Artificial Intelligence, Basic Books, USA, 1993, https://nicholasrobinson.files.wordpress.com/
p. 47-49 2010/01/itj0912_nr.pdf
2 RankRed, “Eight Best Artificial Intelligence 9 Ibid.
Programming Language in 2019,” 3 January 10 Armstrong, R.; “The Volkswagen Scandal
2019, https://www.rankred.com/best-artificial- Shows That Corporate Culture Matters,”
intelligence-programming-language/ Financial Times, 13 January 2017,
3 PricewaterhouseCoopers, “The Essential https://www.ft.com/content/263c811c-
Eight: Your Guide to the Emerging d8e4-11e6-944b-e7eb37a6aa8e
Technologies Revolutionizing Business Now,”
https://www.pwc.com/gx/en/issues/technology/
essential-eight-technologies.html

24 ISACA JOURNAL VOL 4


11 Dastin, J.; “Amazon Scraps Secret AI Recruiting 21 Doyle, B.; “Five Reasons Why Google Glass Was
Tool That Showed Bias Against Women,” a Miserable Failure,” Business 2 Community,
Reuters, 9 October 2018, https://www.reuters.com/ 28 February 2016, https://www.business2
article/us-amazon-com-jobs-automation- community.com/tech-gadgets/5-reasons-
insight/amazon-scraps-secret-ai-recruiting- google-glass-miserable-failure-01462398
tool-that-showed-bias-against-women- 22 Munarriz, R.; “Three Reasons Google
idUSKCN1MK08G Glass Failed,” AOL, 19 January 2015,
12 Bradley, S.; “All the Creepy, Crazy and Amazing https://www.aol.com/article/finance/2015/01/
Things That Happened in AI in 2017,” Wired, 19/why-google-glass-failed/21131761/
20 December 2017, https://www.wired.co.uk/ 23 Eveleth, R.; “Google Glass Wasn’t a Failure. It
article/what-happened-in-ai-in-2017 Raised Crucial Concerns,” Wired, 12 December
13 Bloomberg, J.; “Bias Is AI’s Achilles Heel. Here’s 2018, https://www.wired.com/story/google-
How to Fix It,” Forbes, 13 August 2018, glass-reasonable-expectation-of-privacy/
https://www.forbes.com/sites/jasonbloomberg/ 24 Makarechi, K.; “Google Executive Explains Why
2018/08/13/bias-is-ais-achilles-heel-heres-how- Google Glass Didn’t Take Off,” Vanity Fair,
to-fix-it/#5b7f67256e68 March 2015, https://www.vanityfair.com/
14 Stebbins, S.; E. Comen; M. B. Sauter; C. news/2015/03/google-glass-failures
Stockdale; “Bad Reputation: America’s Top 25 Baron, J.; “Tech Ethics Issues We Should All
20 Most-Hated Companies,” USA Today, Be Thinking About In 2019,” Forbes,
1 February 2018, https://www.usatoday.com/ 27 December 2018, https://www.forbes.com/
story/money/business/2018/02/01/bad- sites/jessicabaron/2018/12/27/tech-ethics-
reputation-americas-top-20-most-hated- issues-we-should-all-be-thinking-about-in-2019/
companies/1058718001/ #52cd52574b21
15 Simonite, T.; “The AI Text Generator That’s Too 26 MIT Technology Review, “10 Breakthrough
Dangerous to Make Public,” Wired, 14 February Technologies 2018,” https://www.technology
2019, https://www.wired.com/story/ai-text- review.com/lists/technologies/2018/
generator-too-dangerous-to-make-public/ 27 O’Shea, S.; “Ann Cavoukian, Former Ontario
16 Stanford Encyclopedia of Philosophy, Privacy Commissioner, Resigns From Sidewalk
“Information Technology and Moral Values,” Labs,” Global News, 21 October 2018,
Stanford University, California, USA, 12 June https://globalnews.ca/news/4579265/
2012, https://plato.stanford.edu/entries/ ann-cavoukian-resigns-sidewalk-labs/
it-moral-values/ 28 CBC News, “‘Not Good Enough’: Toronto Privacy
17 Menachemson, D.; “The New Digital Ethics: Expert Resigns From Sidewalk Labs Over Data
How to Survive and Prosper in Times of Concerns,” CBC, 21 October 2018,
Unprecedented Transformation,” The https://www.cbc.ca/news/canada/toronto/
Mandarin, 14 January 2019, https://www.the ann-cavoukian-sidewalk-data-privacy-1.4872223
mandarin.com.au/101779-the-new-digital-ethics/ 29 Op cit Green
18 Green, B. P.; “What Is Technology Ethics?” 30 Mullane, M.; “Tackling the Ethical Challenges
Markkula Centre for Applied Ethics, Santa of AI,” IEC e-tech, 17 September 2018,
Clara University, California, USA, https://medium.com/e-tech/the-ethics-of-
https://www.scu.edu/ethics/focus-areas/ artificial-intelligence-7a0cf0d9a2cf
technology-ethics/ 31 Ibid.
19 Arthur, C.; “Google Glass: Is It a Threat to 32 Bossman, J.; “Top Nine Ethical Issues in
Our Privacy?” The Guardian, 6 March 2013, Artificial Intelligence,” World Economic Forum,
https://www.theguardian.com/technology/ 21 October 2016, https://www.weforum.org/
2013/mar/06/google-glass-threat-to-our-privacy agenda/2016/10/top-10-ethical-issues-in-
20 Kelly, H.; “Google Glass Users Fight Privacy artificial-intelligence/
Fears,” CNN Business, 12 December 2013,
https://www.cnn.com/2013/12/10/tech/mobile/
negative-google-glass-reactions/index.html

ISACA JOURNAL VOL 4 25


33 Yardley, D.; “Are You Making Ethical https://community.corporatecompliance.org/
Decisions During the Digital Transformation HigherLogic/System/DownloadDocument
Process?” Kogan Page, 29 March 2018, File.ashx?DocumentFileKey=738ccc29-
https://www.koganpage.com/article/ e5f0-4cf4-9ebf-065cc8da7b1c
essential-ethics-for-digital-transformation 38 Ibid.
34 Ibid. 39 Conway, P.; “Ethics, Information Technology
35 SAS, “Three Essential Steps for AI Ethics,” and Today’s Undergraduate Classroom,”
https://www.sas.com/en_us/insights/articles/ Proceedings of the Third Annual iConference,
analytics/artificial-intelligence-ethics.html University of Michigan, USA, 2008,
36 Price, N. J.; “Achieving Strong Corporate https://deepblue.lib.umich.edu/bitstream/
Governance Through Technology,” handle/2027.42/85225/C01%20Conway
Diligent Insights, 24 April 2018, %20Ethics%20IT%20Undergraduate%
https://insights.diligent.com/corporate- 202008.pdf;sequence=1
governance/achieving-strong-corporate- 40 Association for Computing Machinery (ACM),
governance-through-technology/ “ACM Code of Ethics and Professional
37 Herrod, C.; A. Parks; “Strong IT Governance: Conduct,” https://ethics.acm.org/code-of-ethics/
Ethical Arguments and GRC Convergence
Strategies,” SCCE’s 7th Annual Compliance
and Ethics Institute, September 2008,

Ditch the Firewall.


Get DiOTa.
Low Cost
Fast Deployment
Minimal Maintenance
Unhackable Cybersecurity

Data Diodes
Disrupting old school firewalls

owlcyberdefense.com/diota @OwlCyberDefense

26 ISACA JOURNAL VOL 4


FEATURE

The Internet of Medical Things—


Anticipating the Risk
The Internet of Medical Things (IoMT) is and has health management, patient monitoring by
been a driving force of the networked medical healthcare practitioners, activity trackers) and Do you have
device landscape ecosystem. The number of nonwearable, which are hospital- and clinic-based something
medical devices in this space is growing at an connected devices. These connected medical to say about this
astonishing rate and with this comes growing risk devices represent a large population of IoMT, and article?
for the industry. Medical data breaches started well they are prone to vulnerabilities. Properly securing
Visit the Journal pages
before the use of electronic devices and systems, these medical devices helps strengthen the position
of the ISACA® website
but, naturally, with the increased use of electronic large IoMT ecosystems play in the healthcare (www.isaca.org/journal),
personal health information (ePHI), there is a environment. The industry is increasingly focusing find the article and click
growing trend of data breaches in the medical on securing devices, and regulatory bodies are on the Comments link to
space. Between 2009 and 2018, there have been expecting security by design in medical device share your thoughts.
2,546 healthcare data breaches in which more than products that are connected.
https://bit.ly/2MdVrDw
500 records were compromised.1 Practitioners need
to realize that the growing trend of connected
devices creates many benefits, but also brings
enhanced risk to the medical device ecosystem.

The value proposition of connected medical devices


is clear—the benefits are for patients (consumers),
healthcare institutions and providers. IoMT is
clearly increasing the attack vectors and the risk of
cyberbreaches for the industry. This will continue to
increase over time as the demand for and
abundance of connected medical devices
increases. The connected health device market is
expected to reach an estimated US$36.1 billion
worldwide by 2023 and is forecasted to grow at a
rate of 21.1 percent from 2018 to 2023.2

The connected medical device space can be


segmented into two areas: wearable (e.g., home

Mohammed Khan
Is global head of digital health, IT, cyber and privacy audit at Baxter, a global medical device and healthcare organization. He
manages a global team responsible for enterprise risk management across the organization and conducting audits, assessments
and advisory engagements. He has spearheaded multinational global audits and assessments in several areas, including enterprise
resource planning systems, global data centers, cloud platforms (i.e., Amazon Web Services), third-party manufacturing and
outsourcing reviews, process re-engineering and improvement, global privacy assessments (EU Data Protection Directive, the US
Health Information Portability, and Accountability Act [HIPAA], the EU General Data Protection Regulation [GDPR]), and FDA guidance
specific to medical device cybersecurity over the past several years. Khan previously worked as an advisory consultant for leading
consulting firms and multinational organizations. He frequently speaks at national and international conferences on topics related to
data privacy, cybersecurity and risk advisory. He volunteers as an ISACA® Journal article reviewer and contributes actively to the
ISACA Journal and ISACA’s blogs. In 2019, Khan received the ISACA® John W. Lainhart IV Common Body of Knowledge Award.

ISACA JOURNAL VOL 4 27


Regulatory Guidance and Frameworks risk of medical devices.4 Its guidance specifically
Enjoying highlighted recommendations to consider medical
Regulatory guidance and requirements are device premarket submissions for effective
this article? fundamentally uniform when it pertains to patient management of cybersecurity. This was the first
data security and privacy regulations. The following enhancement for safeguarding patients from a
• Read Networked regulations are related to patient data security and medical device cybersecurity perspective after the
Biomedical Device privacy regulations and standards: SMDA was issued. The most recent guidance was
Security.
www.isaca.org/ • EU General Data Protection Regulation (GDPR)— the premarket for cybersecurity guidance and post-
Products and systems that collect EU patient market management of cybersecurity guidance
networked-
data must be considered from a privacy from the FDA (figure 1). Additionally, the FDA
biomedical-
perspective. GDPR went into effect on 25 prefers that medical device manufacturers share
device-security
May 2018. cyberintelligence through Information Sharing and
• Learn more
Analysis Centers (ISACs) and Information Sharing
about, discuss • US Health Insurance Portability and and Analysis Organizations (ISAOs).
and collaborate Accountability Act (HIPAA)—This US legislation
on information provides data privacy and security provisions for
and cybersecurity safeguarding medical information.
Classes of Medical Devices and Risk
in ISACA’s Online It is important to understand the basic parameters
Forums. • US Health Information Technology for Economic
of what makes a device a medical device. Due to
and Clinical Health (HITECH) Act—This US act
https://engage. the authority of the FDA, not only in regulating
was signed into law on 17 February 2009 to
isaca.org/online medical devices sold in the United States, but also
promote the adoption and meaningful use of
forums as an organization at the forefront of medical
health information technology.
device security as a forerunner of globally
• US National Institute of Standards and respected government institutions, the focus here is
Technology (NIST) Special Publication (SP) on an FDA-centric definition of medical device
800.53—This is a catalog of security controls for classes. The regulatory classes of medical devices
all US federal information systems. It organizes are divided up by a classification mechanism called
basic cybersecurity activities at their highest Class I, Class II and Class III. Since the
level, known as functions. classification of medical devices is based on risk, it
is important to understand the risk level and, more
There is no global regulation that requires medical important, what the device is medically going to be
device security as of this writing. What exists, used for and its intended purpose. The classes,
however, are guiding principles and shifts in their risk range and example device classification
landscape in terms of where regulations are going. are shown in figure 2.
This can be seen by looking at the history of
regulation of medical devices. Starting in 1976 in IoMT
the United States, for example, medical device
manufacturers were required to ensure the Many people wake up in the morning to an alarm
establishment of risk-based device classifications, set up on a watch that provides a report to a phone
controls around general and special processes, on how the user’s sleep was the night before. Later,
premarket notification, and approval. This resulted those users can assess how fast and long they ran
in the US Safe Medical Device Act (SMDA), federal on the treadmill, all while monitoring their heart rate
legislation that was designed so that the US Food and cadence, which then gets reported to a daily
and Drug Administration (FDA) could quickly be fitness monitoring chart.
informed of any medical product that had caused or
was suspected to have caused a serious illness, A diabetic patient may have a wearable medical
injury or death.3 device that continuously checks the user’s glucose
level, all while maintaining proper levels in the body
Subsequently, in 2014, the FDA—for the first time in and alerting a healthcare practitioner not only of
its history and as the first regulatory body in the anomalies, but general vitals of the patient for
world—identified and addressed the cybersecurity active monitoring. An artificial pancreas device

28 ISACA JOURNAL VOL 4


Figure 1—US Regulatory Guidance for Medical Device Cybersecurity

21 CFR Part 820.30


FDA guidance related to the design portion of the
medical device and medical device software.
21 CFR 21 CFR
21 CFR Part 11
Part 820.30 Part 11 Part 11 ensures the inspectability of electronic records.
It makes sure the electronic records and available for
the defined retention period, just like paper records.

Medical Device Safety Action Plan


FDA’s intended steps to address medical device safety—consideration
to new pre-market authorities to requiremanufacturers to build security
updates and patches into a product’s design. Post-market disclosure
of cybervulnerabilities, and Software Bill of Materials mandate.
Pre-market Medical Device
Post-market Safety Action Plan Pre and Post-Market Guidance
FDA recommendation and guidance for pre-market and post-market
medical device products, cybersecurity controls, and framework
including use of NIST framework for medical device manufacturers

Figure 2—Medical Device Classes and Risk

Medical Devices Examples


Risk Level

Premarket Approval CLASS Implanted devices such as


HIGH

General Controls pacemakers, implanted


Special Controls III cerebral stimulators
MODERATE

General Controls CLASS Ventilators, surgical


II clamps, bone grafts
Special Controls

CLASS
LOW

General Controls Lab equipment analyzers,


I chemical culture

system will not only monitor glucose levels in the If the patient goes to the hospital and checks into
body, but also automatically adjust the delivery of the emergency room (ER), data from the wearable
insulin to reduce high blood glucose levels device can be extracted and loaded into the
(hyperglycemia) and minimize the incidence of low electronic medical records (EMR) system, which is
blood glucose (hypoglycemia) with little or no input connected to the hospital network, which is further
from the patient.5 connected with physicians’ tablet software so that,
when the patient is seen, all data are available for
the health practitioner.

ISACA JOURNAL VOL 4 29


These are just some examples of how connected • Health monitoring devices—These are normally
the world of medical devices has become. Figure 3 not regulated; however, they pose a great deal of
shows an example. There are many device types risk because the devices collect vitals (e.g., blood
that make up the IoMT space, and they can be pressure, body temperature, heart rate,
divided into the following categories: respiratory rate) and information about the
consumer and/or patient. Bluetooth or Wi-Fi is
• Implantable devices (wireless)—There are
enabled under the direction of the owner of the
several types of implantable medical devices that
device, and these devices monitor physical
are considered Class III, and many of them can
activity and engage in significant communication
be wireless. These include deep brain
with the paired mobile devices.
neurotransmitters, cochlear implants, cardiac
defibrillators/pacemakers and insulin pumps,
just to name a few. These are normally multiyear Device Manufacturers—A Snapshot of
implants, where the physician administers and Guidance
manages the device through routine outpatient Patient safety is the priority of all medical device
service checks. manufacturers, or at least it should be, as they think
• Stationary medical devices—These devices are about the medical device throughout its life cycle.
generally used for outpatient and inpatient Although the FDA has issued guidance and there
services, whether it is an ER visit or a routine are quite a few frameworks that help manufacturers
operation. These devices are in the hospital- navigate complying with regulator, hospital and
connected ecosystem and include infusion patient needs and requirements, there is still room
pumps, chemotherapy dispensaries and for interpretation by device manufacturers. There
homecare cardiovascular systems. These are will always be risk and obligations to address when
normally Wi-Fi-enabled and connect either to the there is a medical device that is connected to the
patient’s home network or the hospital networks. Internet of Things (IoT). Controls, including
mitigation controls manufacturers need to have in
• Wearable medical devices—The intent of these place to avoid or eliminate patient risk, are critical.
devices is for monitoring purposes and collecting Risk factors can include improper access to the
data for further analysis by healthcare providers. device or use of device data to exploit patient
These include wireless-enabled proprietary information or, worse, impact patient health or life
insulin pumps and electromechanical devices for due to device tampering or performance gaps
pain medication. caused by a cyberhack. Due to the connected
Figure 3—Implantable Medical Devices and Improving Patient Experience

Active Implantable Medical Devices


Cloud Service Provider Healthcare Professionls
Connectivity

Active monitoring of patient


data and treatment

Patients

Monitoring of medical conditions of


the patient and collecting vital data Patient controls and
for multi-direction data feeds monitors health

Supply Chain

Ordering patient products and delivery to


healthcare systems and patient homes

30 ISACA JOURNAL VOL 4


device’s ecosystem, especially in a hospital
network, there is a likelihood the exploitability of the
device or the hospital network is quite high due to MEDICAL DEVICES
the industry not being fully mature in the
SUCH AS PACEMAKERS,
cybersecurity space.6 Medical devices such as
pacemakers, insulin pumps and magnetic INSULIN PUMPS AND
resonance imaging (MRI) machines are increasingly
MAGNETIC RESONANCE
vulnerable to hacking. At the moment, however,
there is no US federal mandate for those devices to IMAGING (MRI) MACHINES
have cybersecurity protections.7 Despite the lack of
ARE INCREASINGLY
mandates, there are some key areas for medical
device manufacturers to consider: VULNERABLE TO
• Weak access controls—Limit access to the HACKING.
medical device that is connected, specifically
focusing on ensuring devices have two-factor
authentication built in for proper authentication hardware and software is crucial. This can also be
techniques. enhanced further with the use of properly
• Periodic updates—Apply security patches to the encrypted channels of communication from the
medical device on a frequent basis as best device with the outside world.
practice, per post-market guidance issued by the
FDA. Although the FDA does not require Coming Full Circle With IoMT
approvals for patching medical device software The world of connected medical devices is here to
for cyber-related fixes, it is important to ensure stay, and there is no turning back. Medical
that the proper software development life cycle is technology ecosystems around the world are
put in place for the device well before the product increasing exponentially and will become the norm.
is released in the market. The IoT healthcare market will reach US$136.8
• Coding standards—Many successful billion worldwide by 2021.10 Today, there are 3.7
cyberattacks have exploited vulnerabilities in million medical devices in use that are connected to
code not rigorously tested prior to deployment in and monitor various parts of the body to inform
a live environment.8 One of the important healthcare decisions.11 Medical device
standards in the industry is issued by the manufacturers must ensure proper cybersecurity
International Electrotechnical Commission (IEC), controls are considered as they become more
IEC 62304. This standard provides a robust vested in the safety of the patients and the
feature of how best to develop code from ecosystems to which the medical devices connect.
development to post-production release code life There continues to be a great deal of opportunity in
cycle management. In the European Union, it the space of connected devices and, over time, as
satisfies key requirements in the Medical Devices patients’ health is improved with the advancement
Directive (soon to be replaced by the EU Medical of technology, the industry and the vast number of
Device Regulation). And, in the United States, the regulators monitoring this arena need to keep up
FDA accepts IEC 62304 compliance as proof with the pace of advancement all while keeping
that regulatory processes, such as Section cybersecurity in mind.
510(k) of the FDA, which requires device
manufacturers to notify the FDA of their intent to Endnotes
market a medical device at least 90 days in
1 HIPAA Journal, “Healthcare Data Breach
advance, have been fulfilled.9
Statistics,” https://www.hipaajournal.com/
• Security by design—Proper life cycle management healthcare-data-breach-statistics/
of all aspects of the medical device, i.e., hardware 2 24x7, “Global Connected Health Device Market
and software bill of materials (BOM), to ensure to Reach $36 Billion by 2023,” 16 July 2018,
proper inventory of all third-party and in-house www.24x7mag.com/2018/07/global-connected-
health-device-market-reach-36-billion-2023/

ISACA JOURNAL VOL 4 31


3 US Congress, “H.R.3095—Safe Medical Devices medical-devices-are-woefully-insecure-these-
Act of 1990,” USA, 1990, http://thomas.loc.gov/ hospitals-and-manufacturers-want-to-fix-that/
cgi-bin/bdquery/z?d101:HR03095:@@@ 5c4f4a661b326b29c3778cef/?noredirect=
L&summ2=m& on&utm_term=.0a699b008196
4 US Food and Drug Administration, “Content of 8 Williams, P.; A. Woodward; “Cybersecurity
Premarket Submissions for Management of Vulnerabilities in Medical Devices: A Complex
Cybersecurity in Medical Devices: Guidance for Environment and Multifaceted Problem,”
Industry and Food and Drug Administration Med Devices, 2015, p. 305-316, https://www.ncbi.
Staff,” 2 October 2014, https://www.fda.gov/ nlm.nih.gov/pmc/articles/PMC4516335/
downloads/medicaldevices/deviceregulationand 9 Bellairs, R.; “What Is IEC 62304? Compliance
guidance/guidancedocuments/ucm356190.pdf Tips for Medical Device Software
5 US Food and Drug Administration, “What Is the Developers,” Perforce, 7 February 2019,
Pancreas? What Is an Artificial Pancreas Device https://www.perforce.com/blog/qac/
System?” https://www.fda.gov/medicaldevices/ what-iec-62304-compliance-tips-medical-
productsandmedicalprocedures/homehealth device-software-developers#ssc
andconsumer/consumerproducts/artificial 10 MarketWatch, “Internet of Things (IoT)
pancreas/ucm259548.htm Healthcare Market Is Expected to Reach
6 Zettter, K.; “Hospital Networks Are Leaking $136.8 Billion Worldwide, by 2021,”
Data, Leaving Critial Devices Vulnerable,” Wired, 12 April 2016, https://www.marketwatch.com/
25 June 2014, https://www.wired.com/ press-release/internet-of-things-iot-healthcare-
2014/06/hospital-networks-leaking-data/amp market-is-expected-to-reach-1368-billion-
7 Marks, J.; “The Cybersecurity 202: Medical worldwide-by-2021-2016-04-12-8203318
Devices Are Woefully Insecure. These Hospitals 11 Marr, B.; “Why the Internet of Medical
and Manufacturers Want to Fix That,” Things (IoMT) Will Start to Transform
The Washington Post, 29 January 2019, Healthcare in 2018,” Forbes, 25 January 2018,
https://www.washingtonpost.com/news/ https://www.forbes.com/sites/bernardmarr/201
powerpost/paloma/the-cybersecurity- 8/01/25/why-the-internet-of-medical-things-
202/2019/01/29/the-cybersecurity-202- iomt-will-start-to-transform-healthcare-in-
2018/#4b9e610f4a3c

READY TO TAKE THE NEXT STEP


IN YOUR CYBERSECURITY CAREER?
INTRODUCING CYBERSECURITY CAREER PATHWAYS
In a recent survey, 58% of cybersecurity professionals indicated that they had unfilled
cybersecurity positions in their organization. Nearly one-third of them said that it takes
six months or more to fill those roles, often because applicants lack the qualifying skills.
With this in mind, ISACA has created three specific career-path training programs in
their state-of-the-art Cybersecurity Nexus® (CSX) online cyber academy. Take the
training you need today, to qualify for the job you want tomorrow.

Learn more at www.isaca.org/pathways-jv4

32 ISACA JOURNAL VOL 4


FEATURE

Rethinking Risk
A New Ethics of Enterprise IT

Not all that long ago, getting the enterprise to invest impact analysis (BIA) exercise. The routine BIA may
in IT required some convincing. According to give moderately sophisticated organizations
Do you have
conventional wisdom, IT was a back-office sufficient information, awareness, lead time and
something
operation and no more. Today, the power and incentive to prepare and react. However, IT risk to say about this
potential business benefit of IT are accepted facts— management and prevention should go deeper than article?
indeed, in many industries, IT virtually has the same the average BIA—into the mind-set of organizations,
scope and boundaries of the organization itself, and their employees and leaders, both in IT and the Visit
Visit the
the Journal
Journal pages
pages
of
of the ISACA®® website
the ISACA website
alignment of IT with business strategy and goals is business. The scale of potential failure—running the
(www.isaca.org/journal),
(www.isaca.org/journal),
a key recommendation of IT governance gamut from public inconvenience to catastrophe—
find
find the
the article
article and
and click
click
frameworks. Cybersecurity and information security argues for the recognition of an ethics of IT as a risk on
on the
the Comments
Comments linklink to
to
threats increasingly force awareness of IT risk on domain in its own right. Ethics of enterprise IT share
share your
your thoughts.
thoughts.
boards of directors and senior management. (EEIT) could include organizational culture and
____________________
https://bit.ly/2YUiipm
Compliance requirements—and associated individual employee values, all of which profoundly
penalties—bring IT into board rooms and corner affect IT operations and delivery.
offices and necessitate investment in compliance
risk management. Governance, security and In the context of IT, ethics would address the risk to
compliance failures can be critical and deserve IT systems due to intentional or unintentional
attention at the highest organizational levels; subversion of existing controls and established
however, they do not represent the entire universe of means, where intentional does not necessarily
IT risk. ISACA’s Risk IT Framework asserts that “Risk mean malicious or criminal. Rather, intent would be
IT is not limited to information security. It covers all construed to encompass personal motives, like
IT-related risk,”1 including:2 convenience or expediency in the service of self-
promotion; ideals, like an orientation toward service;
• Late project delivery
and collective dynamics, including politics or
• Not achieving enough value from IT

• Compliance

• Misalignment

• Obsolete or inflexible IT architecture

• IT service delivery problems

So while cybersecurity failures can be catastrophic


and often draw intense scrutiny, especially as they
play out in public debates—for example, around
elections and foreign influence—they are not the
only IT system failures; in fact, the chance of
failures unrelated to cybersecurity may be higher.
Failure of IT systems can disrupt routines and daily
life, e.g., while people shop or bank online, travel, or
use social media. The failure of an airline
scheduling system or unexpected downtime on a Rajesh Srivastava, CISA, CGEIT, ISO 20000, ITIL Expert, PMP
retail shopping website may barely make the local Is a 35-year veteran of the IT industry, with expertise in—and a passion for—
news; however, considering the scope of public IT process improvement, strategy and architecture, and overall cultural
change. He currently leads infrastructure managed services in the United
dependency on these systems, the possibility of
Arab Emirates for a global healthcare IT service provider.
their failure demands more than a typical business

ISACA JOURNAL VOL 4 33


competition, whether between or among whole however, local adherence to principle usually
departments or local teams. Risk IT that accounts depends first on the tone of senior management
for these factors, standards and norms comes and, second, on the understanding and execution of
closer to an ideal coverage of “all IT-related risk.” individuals in IT, all of which can vary across
contracting organizations and geographies.
Taking Stock of Traditional Risk IT Enterprises and vendors alike may cite key
performance indicators (KPIs), key risk indicators
Most relatively mature IT organizations have some (KRIs), the balanced scorecard (BSC), management
degree of IT governance and risk management—and dashboards and so on to illustrate business
may have implemented a governance, risk alignment along with IT service, change, incident
management and compliance (GRC) framework—to and/or risk management. However, the data and
mitigate conventionally recognized risk. However, in controls that inform and mediate these metrics can
the current IT ecosystem—often characterized by be sensitive to local dynamics of data capture and
multiple vendors, implementing diverse solutions, reporting—hence their susceptibility to “intentional
sharing information, or transferring and processing or unintentional subversion.” Principles promoting
data across national boundaries—not all partners fair and open communication and accountability at
will likely have the same level of maturity when it any level (especially at the top) depend upon
comes to risk management and may diverge even organizational culture and values in play wherever
more with respect to the culture and values. data for critical indicators are collected, interpreted,
Traditional risk IT may prove insufficient to cover the packaged and presented, whether internally or to
complexity and variety of the ecosystem (figure 1). business partners. A whole range of IT behaviors
will condition the outcome(s) and call for an ethics
Figure 1—Traditional Risk IT Principles
of IT, not only to articulate ideals, but also to assess
their realization.
Connect to
Business Observations from industries as diverse as oil,
Objectives
banking and insurance help to illustrate the point.
Align IT Risk Despite heavy government oversight and regulation,
Function as
Part of Daily Management events like the Enron scandal or the US subprime
Activities With ERM
mortgage crisis leading to the 2008 US stock
market crash happened. Similarly, insurance fraud is
Risk IT a reality that large organizations have been fighting
Principles
for years. Despite a host of traditional controls,
Establish governance and formal risk management, IT
Tone at the Balance
Top and Cost/Benefit remains exposed to failures that may be averted by
Accountability of IT Risk ethical controls.
Promote
Fair and Open Traditional risk IT emphasizes the centrality of
Communication people, processes and technology.5 People are
influential most constructively in terms of
innovation, creativity and spirit and least
constructively, or even destructively, in terms of
Even if risk is not managed aggressively, most IT human error or bypassing defined controls and
organizations have some level of service processes (whether accidentally or deliberately). An
management maturity (addressed in Information IT auditor with a view of the ethics of risk IT can
Technology Infrastructure Library [ITIL] and look beyond the surface, past the available
International Organization for Standardization evidence, and detect the cultural assumptions,
[ISO]/International Electrotechnical Commission values and dynamics, individual motives, and biases
[IEC] ISO/IEC 20000, among other standards).3, 4 or shortcomings working for or against the
These enterprises generally accept the importance subversion of controls. Although metrics present a
of change management or incident management;

34 ISACA JOURNAL VOL 4


rosy picture, the organization may lack basic so on—corners are cut, and expedient development
awareness of IT ethics and might take a casual decisions go unacknowledged or are hidden from
attitude toward IT discipline. Intelligence and view, all of which, in turn, may compromise the
measures around ethical practices in IT could broad, long-term goal of IT to support business
provide a new dimension of assurance on top of growth and stability and to monitor and reduce risk.
typical risk management.

Organizations such as ISACA® and the Project


Management Institute (PMI) have clear guidelines on
AS THE ETHICS OF IT IS
ethics. Perhaps the whole idea of COBIT®, ITIL or ISO MORE INTEGRATED WITH IT,
and other frameworks—along with the organizations
that maintain and publish them—sufficiently articulate
IT IMPROVES
IT ethics. However, there are many sizes and shapes CONSCIOUSNESS AND
of organizations out there—and many are not mature
enough to adopt service management or governance
REDUCES THE TEMPTATION
principles. Such an organization can easily purchase TO BYPASS ESTABLISHED
a GRC application or help desk tool (and integrate the
tools with existing service management processes);
PROCESSES AND
but appearances of compliance or assurance could CONTROLS.
be misleading.

Among relatively mature enterprises, the use of Personal agendas, organizational politics, distorted
service management processes, controls, automation communication, weak vendor management,
and sophisticated tools is a good defense against department silos and sometimes even unrealistic
wrongdoing in IT; together, they make bypassing service level agreements/timelines/targets can
controls and other processes difficult, especially in dilute the overall intention of IT: to serve business
the absence of deliberate intent. However, like any users and customers.
hacker skilled in finding and eventually exploiting
weaknesses, an internal IT resource may subvert The Risk IT principles “Promotes fair and open
controls with criminal intent. Others can bypass communication of IT risk” and “Establishes the right
established processes—nonetheless intentionally, but tone at the top and while defining and enforcing
without malice, in an effort just to get the work done— personal accountability” encompass a range of
without fully realizing the potential impact of control concrete activities where ethics of IT could set
failures. However, as the ethics of IT is more higher standards, track their achievement, report
integrated with IT, it improves consciousness and abuses and improve outcomes. The following is a
reduces the temptation to bypass established sample list of common and day-to-day IT
processes and controls. operations, where any gaps and deficiencies can
compromise the overall intent of IT:
Ethics of Enterprise IT in Practice • Metrics and dashboards—Data are often
To implement ethics of enterprise IT, one might gathered from multiple sources to assess and
start by looking within the organization, determining report on the health of IT systems for upper
how things actually get done in IT, and management and boards of directors. Tweaking
acknowledging the reality with honesty and these metrics to put the best foot forward,
transparency. For the most part, people do not have impress clients or meet service availability
malicious intent. However, because timelines and targets can be common and may hurt enterprise
delivery targets are often aggressive—and both IT in the long run by obscuring opportunities for
internal teams and external vendors work in all too process improvement.
human contexts of shifting loyalties, internal Metrics and dashboards are usually a rollup from
competition, career aspirations, tight budgets and several underlying data points and sub-metrics.

ISACA JOURNAL VOL 4 35


While several of them can be automated, others impact. Hence, while the change management
could be subjective and, hence, exposed to policies list the types of changes or criteria of a
misrepresentation. Even with automated data change, it is critical to embed and track the
collection, the tie to actual user experience or ethical behavior in this area.
service availability can be subjective. As an
example, infrastructure uptime statistics do not
• Incident management—Responses to IT
incidents can be compromised by lack of
necessarily mean optimal user experience and
transparency or failure to complete appropriate
satisfaction. Therefore, resources responsible for
root cause analysis in order to protect individuals
interpreting the metrics and related data must
and/or teams. The goal of incident management
see them from the ethical point of view, i.e., is the
is to return the system to its stable state in the
end goal being met?
shortest possible time and minimize user impact,
especially for major incidents. However, for
complex IT architecture or fragile legacy
THE CULT OF THE IT environments, a culture of the knight in shining
armor or hero often flourishes. One individual
HERO CAN ENCOURAGE
knows all the shortcuts taken over time and,
COMPETITIVE HOARDING thus, becomes virtually indispensable to fix
issues or apply the next temporary fix. The cult of
OF KNOWLEDGE VS.
the IT hero can encourage competitive hoarding
AUTHENTIC KNOWLEDGE of knowledge vs. authentic knowledge sharing
and team learning. This has a direct bearing on
SHARING AND TEAM
the goal as mentioned previously; as an example,
LEARNING. incident closure does not eliminate the
dependency on individuals or their shortcuts. In
an ethics-rich IT environment, these tendencies
• Change management—To get the work done, would be addressed by balance of knowledge
nudge a project over the finish line a little early or and transparency.
satisfy an important stakeholder, routine
changes may be pushed as an emergency, in
• Vendor management—Favoritism in awarding
contracts—regardless of what is best from an
violation of change management policy.
enterprise architecture perspective—can
Bypassing or overruling a change advisory board
compromise long-term efficiency and quality. IT
(CAB) or other governance function, senior
partners or vendors may oversell irrelevant data
management or executives may insist on an
and/or solutions to senior management.
emergency change to secure a major contract or
sale or ingratiate an important customer, It is a normal practice to have best-of-breed
regardless of the underlying risk. Unauthorized technologies or pick technologies that align with
changes are one of the common underlying the current ecosystem and enterprise
causes of IT failures. architecture. However, pushy vendors offering
heavy discounts to get their foot in or senior
Unauthorized changes are, by nature, an ethical
management bringing preconceived notions from
issue. Also, unauthorized changes are more than
elsewhere can break the ecosystem and impacts
unapproved changes. Change management is also
IT’s ability to support these technologies. A
about understanding the “seven R’s,” i.e., who
recent ethics investigation at the Georgia
raised the change, what is the reason for
Institute of Technology (USA) examined a claim
the change, what is the return required from the
that the university’s chief information officer
change, what are the risk factors involved
(CIO) had a personal relationship with a vendor’s
in the change, what resources are required to
sales representative, resulting in the university
deliver the change and what is the relationship
paying too much for equipment from the vendor.7
between this change, and other changes,6
Unfortunately, many ethical violations go
which can be easily lost among day-to-day
unreported and uninvestigated. Vendor selection
IT operational needs.
should be driven by the vendor’s ability to support
Considering change is a permanent reality of IT the organization, the need for its services and
operations, this is the area where awareness and meeting business requirements. Anything else
consciousness probably have the most direct could be a violation of IT ethical behavior.

36 ISACA JOURNAL VOL 4


• Consulting—Encouraging fluff consulting can • Audit and assurance—Strong controls may be
sometimes elevate the perceived importance or avoided to increase agility. Conversely, controls Enjoying
criticality of teams or departments in the eyes of may become so inflexible or autocratic in terms of
this article?
senior management, especially when consultants security and change that barely anything gets
do not understand or command the necessary done. Protection trumps innovation completely,
• Read Getting
technical experience or detailed history of the and striking the right balance can require a highly
Started with Risk
enterprise’s IT. Additionally, consultants can pad developed judgment that considers business,
Management.
their billable hours and recommend more complex technical and ethical dimensions at the same time.
www.isaca.org/
options than what is practical or necessary.
A complex control does not necessarily translate getting-started-
External parties are expected to bring an into its effectiveness; it may, in fact, fuel the with-risk-
unbiased and trusted advisor perspective. tendency to bypass it to get the work done, hence a management
However, if not managed well, the aspects of risk to ethical behavior. As mentioned previously, • Learn more
supportability and true need can potentially be the right balance of control effectiveness with about, discuss
compromised with complex, unachievable and agility and flexibility can have a positive influence and collaborate
long-term goals that may not meet the on ethical behavior. The previous are some on risk
organizational objectives. Therefore, to meet or examples, where the existing technical or management in
exceed the billable hours is an ethical behavior organizational controls (however widely ISACA’s Online
risk that needs to be managed well. recognized and well conceived), common best Forums.
practices, and qualitative measurements may not https://engage.
• Service management—Enterprise architecture
address the real underlying culture of IT. isaca.org/online
and service management can favor certain tools
Organizations and auditors who begin to account forums
over others that might be better fit for purpose or
for the behavioral aspects of IT can understand—
more cost-effective. Multiple platforms or
and potentially address—the subtle tendencies for
duplicative applications may be tolerated or
or against subversion of common controls. Hence,
overlooked to please stakeholders in place of a
an ethics of IT becomes, if not yet a formal
common platform or shared tools that could be
discipline, then a soft skill or attitude to foster at all
more easily maintained and documented.
levels, whether among boards of directors,
executives, managers, teams or individuals.
Service management plays a vital role when it
comes to service quality and management.
However, simplicity is key; complex processes Conclusion
may push the tendencies to bypass controls, An ethical perspective can help the enterprise assess
hence posing potential behavior risk. A common behavioral aspects of IT and the human dynamics of
example these days are the security controls that, organizational culture. Senior management and their
though absolutely essential, lack agility, which values play an important role, as indicated by the key
could be seen as a hindrance to getting essential Risk IT principle “Establishes the right tone at the top
critical work completed and could pose a and while defining and enforcing personal
temptation to bypass the established controls. accountability.” In organizations where transparency
and accountability seem especially lacking, a trusted
• Continuous improvement—A culture of isolated,
disparate and/or organizationally misaligned third party or unbiased partner should be established in
teams or individuals can encourage defensive IT. Along with conventional KPIs and KRIs, there should
behaviors and resistance to change. be an ethics indicator—not to police IT, but to ensure
that a barometer of IT ethics remains an integral part
The terms “lessons learned,” “root cause of risk management. In addition, each IT employee
analysis” and “problem management” are talked (including senior managers) should receive mandatory
about generously in most IT organizations, IT ethics (part of an organization’s risk management
especially at senior management level. However, framework awareness) training every year, much like
depending on organizational maturity and local security or change management training—in fact,
political dynamics, the continuous-improvement ethics training ideally should supersede and lead into
mind-set may vary. Considering that continuous all other training, whether technical, risk, compliance,
improvement is core to service quality (reference: etc. The goal is to raise awareness and foster an
plan-do-check-act [PDCA] model),8 it needs to be ethical culture, to treat the topic of IT ethics seriously,
embedded into the organization’s IT ethics policy and establish ethics as a top metric when KPIs related
and tracked for mind-set risk and roadblocks. to risk management are measured and reported.

ISACA JOURNAL VOL 4 37


If ethics of IT gains traction over time and garners 4 International Organization for Standardization,
more attention, comments and developments, “ISO/IEC 20000-1:2018,” September 2018,
perhaps a new type of GRC can become the norm— https://www.iso.org/standard/70636.html
one that looks beyond standards, best practices 5 ITIL News, “ITIL: Back to Basics
and compliance. It would pay attention to the core (People, Process and Technology),”
values engrained into IT strategy and operations https://www.itilnews.com/index.php?pagename=
and bring ethics to bear not only on IT controls and ITIL__Back_to_basics_People_Process_and_
processes, but also on the behaviors of those who Technology
interact with them. 6 Information Technology Infrastructure Library
(ITIL), “ITIL V3 2011: Service Transition. Change
Endnotes Management,” 2011
7 Horne, W.; M. Foxman; “Investigative Report:
1 ISACA®, The Risk IT Framework, USA, 2009, The Georgia Institute of Technology Ethics Line
www.isaca.org/Knowledge-Center/Research/ Report USGB-18-08-0018,” 15 April 2019,
ResearchDeliverables/Pages/The-Risk- https://www.news.gatech.edu/sites/default/
IT-Framework.aspx files/cio-final.pdf
2 Fischer, U.; “Risk IT Based on COBIT®,” ISACA, 8 International Organization for Standardization,
www.isaca.org/Knowledge-Center/Standards/ “ISO/IEC 20000-1:2011,” https://www.iso.org/
Documents/Risk-IT-Overview.ppt standard/51986.html
3 Axelos, “ITIL—IT Service Management,”
https://www.axelos.com/best-practice-
solutions/itil

2019 VIRTUAL
INSTRUCTOR-LED
TRAINING
C Y B E R S E C U R I T Y A U D I T C E R T I F I C AT E
29–30 AUGUST

CISA EXAM PREP COURSE


9–12 SEPTEMBER

CRISC EXAM PREP COURSE


23–26 SEPTEMBER

CISM EXAM PREP COURSE


21–24 OCTOBER

C Y B E R S E C U R I T Y F U N D A M E N TA L S
5–6 NOVEMBER

www.isaca.org/VILT19jv4

38 ISACA JOURNAL VOL 4


FEATURE

Three Strategies for a Successful


DevSecOps Implementation
The DevSecOps methodology movement began in professionals have concerns—vulnerable code, if
response to security concerns with the DevOps not checked, can also be deployed faster. For
Do
Do you
you have
have
methodology. DevOps revolutionized the software example, a developer who hardcodes an application
something
something
industry by enabling high-speed software releases program interface (API) key into code can to
to say
say about
about this
this
through technological and cultural changes. It potentially push this insecure piece of code into a article?
article?
focuses on automation and integration of remote repository and trigger testing and publishing
processes, but the manual information security to production in minutes. Information security Visit
Visit the
the Journal
Journal pages
pages
of
of the ISACA®® website
the ISACA website
processes that traditionally created security professionals traditionally relied on manual
(www.isaca.org/journal),
(www.isaca.org/journal),
assurance in a software release do not fit into this processes, such as change management, secure
find
find the
the article
article and
and click
click
new methodology. Hence, DevSecOps emerged to code reviews, scans and penetration tests, to inject on
on the
the Comments
Comments linklink to
to
address the security issues. The experience of security assurance into software release processes. share
share your
your thoughts.
thoughts.
applying this methodology resulted in the The traditional way of security assurance cannot
____________________
https://bit.ly/2JHR5md
identification of three key success factors for a keep up and does not work in a CI/CD world; as a
DevSecOps implementation. result, reengineering steps were needed.

The Path to DevSecOps These concerns led to the start of the DevSecOps
methodology movement, which applies the same
DevOps is defined as a “combination of cultural principles to cybersecurity that DevOps applies to
philosophies, practices, and tools that increases an traditional IT processes to improve efficiency and
organization’s ability to deliver applications and
services at high velocity.”1 DevOps does not treat
the development and operations teams as separate
entities. Instead, DevOps blurs the lines between the
two entities, resulting in greater harmony and
alignment, without compromising quality. Estimates
say the global market for DevOps will reach
US$12.85 billion by 2025.2

DevOps is simply the natural evolution of the Agile


methodology, which aims to counter the flaws in a
traditional waterfall software development life cycle
(SDLC) approach. The Agile movement focuses on
improving efficiency by releasing software
frequently, in feedback-focused iterative loops.
DevOps focuses on automation and integration of
the processes that happen before and after the
software release into production, such as Taimur Ijlal, CISA, CISSP
development, build, test, compilation and monitor. Is an information security professional with more than 16 years of
DevOps typically relies on popular open-source experience in cybersecurity and IT risk management. He manages the
information security portfolio for one of the largest payment solutions
tools for a continuous integration/continuous
providers in the Middle East. Previously, Ijlal was the head of information
development (CI/CD) pipeline that makes rapid
security at Dubai Bank, where he was responsible for the strategic oversight
feedback and deployment of code possible and of its cybersecurity framework and maintaining an information security
enables enterprises to achieve multiple high-speed management system (ISMS). He also set up IT audit and information
software deployments daily. security departments for leading Pakistan enterprises, including Bank
Alfalah and Bank AL Habib Ltd. Ijlal speaks in various information security
Although reduced time to market makes business forums and has written articles for the e-security section of the Pakistan
and product teams very happy, cybersecurity technology magazine Spider.

ISACA JOURNAL VOL 4 39


removes manual intervention wherever possible. secure source code reviews and automated
Enjoying DevOps aims to shift security to the left by vulnerabilities scanning, give advice on
incorporating security assurance at every stage of vulnerabilities, and, when required, escalate matters
this article?
the CI/CD pipeline and making it as essential a to the enterprise security team. As developers
success criterion as development and testing. This become more comfortable sharing security
• Read DevOps:
shift is achieved by building and automating information within their team, a culture of
Process Maturity
security into the CI/CD pipeline and requires a awareness and information sharing advances
by Example.
cultural change that must be endorsed by top-level within DevSecOps. A DevSecOps program may
www.isaca.org/
management to succeed. include incentives to encourage buy-in to the new
devops-process-
culture, such as awards and prizes for the
maturity-by-
Lesson 1—Developers Are the Security developers who identify and fix the greatest number
example
Team’s Friends of security bugs in a software release before it goes
• Learn more about,
into production. A spirit of teamwork can be
discuss and Traditionally, developers and cybersecurity fostered further by setting up collaboration
collaborate on professionals have been on the opposite ends of channels for quick informal feedback chats
information and the security spectrum and viewed each other with between the information security and development
cybersecurity in some suspicion. Developers have tended to believe teams and sharing a security knowledge base to
ISACA’s Online that information security professionals introduce help demystify common security vulnerabilities.
Forums. road blocks and delays at the last minute; Enterprises that are serious about DevSecOps must
https://engage. cybersecurity professionals often have seen invest in security training and development as
isaca.org/online developers as the prime culprits who are heavily for local security champions as for
forums responsible for introducing software vulnerabilities, cybersecurity staff.
due to their perceived tendency to take shortcuts
when writing code. For a successful DevSecOps Lesson 2—Continuous Integration Needs
program, these relationships must be repaired.
Continuous Security
In a traditional software release, the information
security team is an independent entity that provides
DEVELOPMENT STAFF objective feedback and runs security tools at
SHOULD BE SEEN AS AN various stages in the life cycle to provide feedback
on vulnerabilities and insecure code. However,
EXTENSION OF these actions are done manually and must pass
INFORMATION SECURITY multiple security clearance gates before software
can be deployed. The traditional tools cannot keep
STAFF—NOT A SEPARATE up with the fast pace of DevOps software releases,
SILO WITHIN THE resulting in missed basic security hygiene checks
and vulnerabilities that are pushed into production.
ENTERPRISE. For the traditional procedures and tools to be able
to work in a CI/CD world, the security team would
allow the DevOps team access to the security tools
Development staff should be seen as an extension to make the tools an integral part of the DevOps
of information security staff—not a separate silo pipeline, similar to the automated build, compilation
within the enterprise. The information security team and testing tools. For example, every new code
should identify and train security champions on check-in should immediately trigger a secure code
good security practices and automation tools, review API to give the development team immediate
which can give them early feedback on security feedback on any security vulnerabilities. Similarly, a
weaknesses within their software. These local successful software build should trigger an
security experts then become the voice of automated API job for application vulnerability
information security and can solve common scanning and pass/fail the build based on
security roadblocks quickly, recommend tools for predefined criteria that are agreed on by the teams.

40 ISACA JOURNAL VOL 4


This scenario shows that the traditional way of bounty programs crowdsource and incentivize the
logging in to a console and initiating security discovery of software vulnerabilities and offer cash
scans/code reviews is not feasible in DevOps; these rewards (bounties) to security researchers who find
tasks must be transformed into consumable and report vulnerabilities. Although bug bounty
services that can be called on demand via API calls programs are regularly used by large enterprises,
by the DevSecOps team. including Facebook and Microsoft, bug bounty
programs should become the new normal and a
Information security professionals need to ensure standard tool for all enterprises invested in
that tools are compatible with CI/CD tools and can DevSecOps. With a bug bounty program, enterprises
be used in a DevSecOps environment. The policies, get the assurance that every change to their
procedures and service level agreements (SLAs) for software is subjected to a wide variety of intensive
software security assurance should also be tests by numerous security professionals with vast
reviewed to ensure that they can be adapted to and cumulative experience. A bug bounty program
work in a high-speed CI/CD world. extends and complements (but does not replace)
the enterprise standard vulnerability scanning and
penetration testing exercises.

A BUG BOUNTY
DevOps Is Critical to Evolution
PROGRAM EXTENDS AND
The previously mentioned strategies are a few of
COMPLEMENTS (BUT DOES the key success factors for a DevSecOps program,
but they only are a starting point and not an
NOT REPLACE) THE
exhaustive list. The era of high-speed software
ENTERPRISE STANDARD deployments is here to stay. A quick fix to
implement DevSecOps does not exist. Enterprises
VULNERABILITY SCANNING
must invest significant time and effort in changing
AND PENETRATION their culture, tools and staff skill set to adapt and
get the best results from DevOps while remaining
TESTING EXERCISES.
secure. Information security professionals must
realize that, more than any tool or technology, their
mind-set must evolve to survive and remain relevant
Lesson 3—Bug Bounty Programs Must in a DevOps world.
Become Business as Usual
Many enterprises use continuous penetration Endnotes
testing as a tool to assess the security of their 1 Amazon Web Services, “What Is DevOps?”
software products after major changes. Although 2019, https://aws.amazon.com/devops/
this tool works well in a traditional environment, what-is-devops/
manual penetration tests do not scale well in a 2 DEVOPSdigest, “DevOps Market Worth
DevOps environment and need to be supplemented $12.85 Billion by 2025,” 19 March 2018,
with bug bounty programs to be truly effective. www.devopsdigest.com/devops-market-
Every daily release of code can contain worth-1285-billion-by-2025
vulnerabilities that may have been missed by
security tools and tests earlier in the pipeline. Bug

ISACA JOURNAL VOL 4 41


FEATURE

Bridging the Gap Between


Policies and Execution in an
Agile Environment
With the perpetual occurrence of high-profile attacks integrating standards and regulatory requirements
and data breaches caused by software vulnerabilities, into design and development processes.5, 6
Do you have
a new trend known as secure by design (“shifting
something
to say about this left”) has gradually shaped the software world.1, 2, 3 It is At the same time, development life cycles are
article? easier today to convince strategic governance teams becoming shorter, and software releases are
that nonfunctional requirements such as security becoming more frequent. Traditional and linear
Visit the Journal pages requirements, are equally as important as functional software development processes (e.g., waterfall
of the ISACA® website
requirements. After-the-fact security activities such models) are being replaced by Agile processes.
(www.isaca.org/journal),
as patching and integrations have proven to be much Moreover, with the advent of DevOps practices
find the article and click
on the Comments link to more expensive and less effective than incorporating where traditionally separate business units now
share your thoughts. security requirements into the early stages of design.4 work closely together using Agile methods, the
boundary between development and operations has
https://bit.ly/2JJcOKs
However, designing applications with security at the become blurred. Practices such as continuous
forefront raises new challenges. Organizations integration/continuous development have grown
must comply with an array of regulations and popular among software development teams.
standards based on factors such as their sector, Exacerbating this complex environment is the push
location, whether they deal with personal data and toward automation to minimize the latency of
more. The cost of noncompliance can be much releasing new software features.
higher than the cost of a proactive approach to

Mina Miri
Is a security researcher at SD Elements/Security Compass. She is particularly attuned to the need for applications to have well-
developed security characteristics. In her current position, she researches various security and privacy contexts for securing
software all throughout its life cycle. Miri has published articles in the ISACA® Journal and IAPP Privacy Tech, and she has
presented at the Open Web Application Security Project (OWASP) AppSec conference.

Amir Pourafshar, CISSP


Is a senior security researcher at SD Elements/Security Compass. He has more than seven years of information security research
experience ranging from malware behavioral analysis to formulating secure software development life cycle practices. Pourafshar
contributes to global forums such as PCI Security Standards Council (PCI SSC) and SAFECode and presents at conferences such
as OWASP AppSec.

Pooya Mehregan, Ph.D.


Is a security researcher at SD Elements/Security Compass. He has more than a decade of academic and industry-related
experience in software and information security. His main areas of research are in application security, access control and privacy.
He has published and presented at academic venues such as the ACM Conference on Computer and Communications Security
(CCS), the ACM Symposium on Access Control Models and Technologies (SACMAT), and the IFIP WG 11.3. Conference on Data
and Applications Security and Privacy (DBSec).

Nathanael Mohammed
Is a technical writer at SD Elements/Security Compass. He specializes in communicating about technology, with a focus on
security and privacy. He has been involved with projects concerning EU General Data Protection Regulation requirements in Agile
software development, and he has published an article on a tagging approach to privacy impact assessments in IAPP Privacy Tech.

42 ISACA JOURNAL VOL 4


There is a dilemma that forms between these abstract by requiring secure processes around the
security by design and Agile software development software development life cycle (SDLC), rather than
and deployment phenomena: Security requirements providing straightforward, actionable tasks. This
are considered disruptive to Agile practices by the could be an attempt to render regulations and
vast majority of the software community.7 standards persistent in the face of a changing
Therefore, there needs to be a system of injecting environment. Testing this hypothesis, however,
actionable security requirements into the short requires a separate study and falls outside the
development cycles of Agile processes. In addition scope of this work. Instead, the following is an
to this, this system needs to bridge the gap between approach for staying compliant with new and ever-
the policy space and the execution space. This gap changing regulations in an Agile SDLC environment
is created when the requirements of policies, with minimal business disruption or slowdown.
regulations and standards are too high level and
abstract, which causes the process of extracting Research Methodologies for
actionable tasks from them arduous, if not Consolidating Security Controls
impossible. Systems that provide these translations
are known in the security community as policy to Figure 1 provides a high-level overview of the
execution (P2E) platforms.8, 9, 10 At the moment, only approach used in the study presented herein. After
a handful of these platforms have been developed, a preliminary examination of sources and required
but their numbers are growing rapidly. information, an extensive literature review was
conducted to gather information about existing
workflows for addressing the governance of
technologies in organizations.
THERE NEEDS TO BE A
SYSTEM OF INJECTING Existing standards from external (e.g., compliance
regulation) and internal (e.g., internal policies)
ACTIONABLE SECURITY sources and industry best practices were analyzed
REQUIREMENTS INTO THE to gain insight about current controls in tactical
governance. Subsequently, a set of interviews was
SHORT DEVELOPMENT conducted with subject matter experts (SMEs) to
CYCLES OF AGILE extract information about their experiences in
completed projects. The interviews consisted
PROCESSES. largely of open-ended questions about existing
processes. The results from SME interviews were
then collected to verify consolidated controls from
Regulatory bodies continue to publish new security the aforementioned sources. In the next step,
and privacy regulations and standards, such as the actionable controls were formulated from analyzing
EU General Data Protection Regulation (GDPR) and all collected resources.
the recently published Payment Card Industry
Software Security Framework (PCI SSF), in an Principles for Addressing Business and
attempt to accommodate the ever-changing Security Needs
software landscape. The gap between policy and
execution is widening because policies mandated This study is based on three fundamental principles
by regulations and standards have become more for success. One is that the proposed process can

Figure 1—Overview of the Studied Approach

• Analyzing old and


new standards Formulating
Preliminary • Analyzing client Identifying actionable Mapping tasks to
study best practices gaps tasks their relevant
• Interviewing SMEs mandates and
• Studying maturity generating reports
models
• Analyzing governance
frameworks

ISACA JOURNAL VOL 4 43


Historically, many organizations that handle credit
cards, such as payment software vendors and
payment providers, have been subject to PCI Data
Security Standard (PCI DSS) compliance. PCI DSS
requirements revolve around a product’s technical
security features and configurations for maintaining
data integrity and confidentiality such as cardholder
data encryption, strict access control and firewall
configuration. However, PCI SSLC focuses on
securing the software life cycle and building a
secure software production and maintenance
ecosystem regardless of the technology stack. This
new need for compliance encourages strategic
governance teams to recognize that, in addition to
data security, application life cycle security is a
be repeated for existing and future standards business requirement. This business requirement
without slowing down the production pipeline. The mandates that product teams at the tactical
second is that the process should be minimally governance level look for a new framework to build
disruptive to developer workflows and easily secure software life cycle capabilities. However, due
integrated into their day-to-day activities. The third to the widening gap between new requirements and
is that the process should be seamlessly adaptable traditional technical practices, it is not trivial to
to organizations of any maturity level and size translate high-level strategic governance mandates
without changing the structure of production to and policies into step-by-step guidelines for building
make the process functional. Taking these three new practical processes for technical product
principles into account allows for a unique solution teams. Moreover, adding a variety of emergent
in addressing the policy-to-execution gap. tools, frameworks and software development
techniques to the endeavor renders it
Use Cases overwhelming.

In this study, PCI SSF is analyzed as a recently In the first step of the proposed framework, PCI
published compliance regulation.11 In January 2019, SSLC guidelines are analyzed and compared to
the PCI Security Standards Council (PCI SSC) existing best practices. This analysis helps identify
released two new PCI Software Security Standards gaps in the currently implemented controls. For
as part of the new PCI SSF. These standards are the example, section 4.1 of PCI SSLC requires a mature
PCI SSC’s efforts to better address the integrity of process for security testing that aims to determine
payment transactions and the confidentiality of all the existence and emergence of vulnerabilities.
sensitive data as new technologies and software While existing best practices aligned with traditional
development practices emerge. standards and business requirements advise
utilizing static application security testing (SAST),
The Secure Software Life Cycle (Secure SLC or they do not require a proper process for identifying
SSLC) Requirements and Assessment Procedures the appropriate tool, the practical integration of
is a standard in the PCI SSF that offers security those tools into the application development and
assessment guidance for both the development and deployment pipelines, or the proper management of
operations life cycles. Secure SLC compliance vulnerabilities.
aligns with Agile and continuous deployment
methodologies to develop software faster and Although the new standard mandates the addition
without requiring an assessment from a qualified and governance of more processes and activities to
assessor for each release.12 an application’s life cycle, it does not provide a code
of practice or set of guidelines for implementation.

44 ISACA JOURNAL VOL 4


Therefore, tactical governance teams may choose with an example in figure 3, facilitates mapping
any of the decisions from figure 2 to address this policy-level requirements to execution-level tasks. Enjoying
gap. Each of these decisions leads to detrimental It also compiles a compliance report that lists
this article?
consequences. actionable steps required to comply with particular
sections.13
• Read Reasonable
Next, SMEs such as a development manager,
Software Security
application security (AppSec) advisor and security For example, PCI-SSLC section 4.2 requires
Engineering.
verification engineer are interviewed. Each of them establishing a mature process for identifying and
www.isaca.org/
provides their experience and perspective of the fixing software vulnerabilities.14 The proposed
reasonable-
secure SDLC in Agile environments. Having all approach is used to add a new execution-level task
software-security-
information from both the compliance and to the existing P2E platform. Figure 4 shows the
engineering
execution sides, an extensive analysis is completed content of this task.
• Learn more about,
to improve existing practices and is organized into
discuss and
actionable processes. At one end of the spectrum, As shown in figure 4, actionable steps are
collaborate on
these processes are aligned with high-level identified to establish and execute a process for
information and
compliance requirements and, on the other, they are finding vulnerabilities and fixing them using SAST
cybersecurity in
compatible with production technology stacks. The tools. This new task, as well as others, can now be
ISACA’s Online
outcome is imported to an existing P2E platform in mapped to the sections of PCI SSLC that have
Forums.
the form of tasks that prescribe actionable steps to been added to the P2E platform as a new
https://engage.
relevant roles for establishing and executing secure compliance report. Figure 5 shows an excerpt of
isaca.org/online
SDLC processes. The existing P2E platform, shown the compliance report.
forums
Figure 2—Unsystematic Approaches to Filling the Gap Between SSLC Policies and Executable Processes
Decision Consequence
Assuming existing practices are sufficient • Failing compliance audits
• Risking security incidents
Building new practices internally • Missing gaps in certain areas
• Incurring huge expenses
• Having a bias toward internal practices
• Engaging in conflicts of interest
Adapting practices developed by other teams • Dealing with inconsistencies
• Managing inapplicable controls

Figure 3—P2E Platform

(PCI-SSLC) 4.2: POLICY EXECUTION Task T1368:


Newly identified Establish a
or discovered P2E Agile process for
Security
vulnerabilities are PLATFORM Development performing
fixed in a timely security testing
manner. using SAS
Privacy An Expert System DevOps
Generating Actionable tools.
Tasks for
Technical Teams
Compliance IT Operations

ISACA JOURNAL VOL 4 45


Figure 4—Section 4.2 of the PCI SSLC in the Form of a Task (Screenshot of the Task in the P2E Platform)
T1368: Perform security testing using SAST tools
Follow these guidelines for proper integration of a SAST tool into your SDLC:
• Choose a SAST tool appropriate for your software architecture (such as monolithic, service-oriented, micro-services,
and so on), programming language, and development frameworks.
– For example, configure and use OS/cloud configuration scanning, such as Microsoft Baseline Security Analyzer or
Evident.IO, for cloud environments.
• Configure the SAST tool to include:
– The entire code base
– Configuration files
– Third-party and open-source components
– Shared components and libraries
• Execute SAST routinely at least in one of the following phases based on the maturity of the existing security controls:
– Where applicable, add the SAST tool’s plug-in to the developer IDE (development team should be highly mature)
– Code commit
– Unit, integration and regression testing
– After staging release to scan static files and configurations of different components (development team is not very
security aware but a security team handles the scan)
• Triage results and update the scanner profiles to reduce the number of false positives of the next scans. The following
strategies help with reducing the false positives:
– Interviewing the development team to figure out how mature they are from security perspective.
– Suppressing certain low-level vulnerability categories if there are other means of proof. For example, if a team uses
certain framework or library to cover that category.
– Suppressing a false positive in a file as long as its hash value has not changed since the last scan.
– Communicating the true findings with developers.
• Properly document and maintain an inventory of the scanning results and the corresponding actions taken to address
the findings.
• Identify proper controls to permanently fix discovered vulnerabilities (true positives).

Figure 5—PCI SSLC Compliance Report for a Sample Payment Software


Section Regulation Description
Task ID Task Title Status
Section 4.2 Newly identified or discovered vulnerabilities are fixed in a timely manner. The reintroduction of
previously resolved vulnerabilities is prevented.
T1368 Establish a process for performing security testing using SAST tools Incomplete
T1369 Establish a process for performing security testing using DAST tools Complete
Section 5.1 All changes to payment software are identified, assessed, approved, and tracked.
T1372 Establish and follow a software change management process Complete
… … … …

Conclusion and Next Steps was leveraged to mitigate the perceived disruption
of security requirements for Agile and DevOps
This approach seeks to bridge the gap between environments. Next, best practices with respect to
complying with requirements outlined in a each requirement given in the PCI SSF were
regulation and determining actionable tasks using a compiled from the experience of organizations of
policy-to-execution platform. This systematic varying maturity levels. Then, SMEs were
approach can be repeated in similar situations interviewed to evaluate and augment the collected
where requirements in regulations are too high level best practices in the previous step. The entire
and do not provide sufficient guidance for process led to a set of actionable tasks that
implementation. Though this example used the correspond to the original requirements of a
newly published PCI SSF, a similar approach can be compliance regulation, which can be adapted to an
adopted with other compliance regulations. The organization of a given maturity level.
utility of an existing policy-to-execution platform

46 ISACA JOURNAL VOL 4


An ongoing project designed to automate the 8 Mohamed, S. I.; “DevOps Maturity Calculator
process of listing required tasks to reduce as much DMOC—Value Oriented Approach,” International
manual work as possible is underway. A pattern for Journal of Engineering Research & Science,
designing such a method has already been created vol. 2, iss. 2, February 2016, https://www.
and is also under development. In this method, the academia.edu/32117015/DevOps_maturity_
P2E platform used in this study collects necessary calculator_Value_oriented_approach
information from different sources such as code 9 Johnson, M. E.; E. Goetz; “Embedding
scanner results and its own activity logs to assign a Information Security Into the Organization,”
task to the responsible role within the required time IEEE Security & Privacy, May/June 2007,
frame. Once the undertaking is complete, the www.ists.dartmouth.edu/library/352.pdf
process will be tested on a live project for a better 10 Sultan, K.; A. En-Nouaary; A. Hamou-Lhadj;
evaluation of the approach. “Catalog of Metrics for Assessing Security
Risks of Software Throughout the Software
Endnotes Development Life Cycle,” 2008 International
Conference on Information Security and
1 Lietz, S.; “<— Shifting Security to the Left,” Assurance, Busan, South Korea, April 2008,
DevSecOps, 5 June 2016, https://www.devsecops. https://ieeexplore.ieee.org/document/4511611/
org/blog/2016/5/20/-security 11 Gray, L. K.; “Just Published: New PCI Software
2 The Open Web Application Security Project Security Standards,” PCI Security Standards
(OWASP) Foundation, Security by Design Council, 16 January 2019, https://blog.pcisecurity
Principles, https://www.owasp.org/ standards.org/just-published-new-pci-software-
index.php/Security_by_Design_Principles security-standards
3 Schneier, B.; “Patching Is Failing as a Security 12 Security Compass, “How You Can Comply With
Paradigm,” Motherboard, 16 November 2018, The New PCI Software Security Framework,”
https://motherboard.vice.com/en_us/article/ 17 January 2019, https://blog.security
439wbw/patching-is-failing-as-a-security-paradigm compass.com/how-you-can-comply-with-the-new-
4 Muresan, R.; “Costs of Non-Compliance Are pci-software-security-framework-f1013d4df0b7
Getting Higher,” Bitdefender, 2 April 2018, 13 Miri, M.; F. H. Foomany; N. Mohammed;
https://businessinsights.bitdefender.com/ “Complying With GDPR: An Agile Case
costs-of-non-compliance-getting-higher Study,” ISACA® Journal, vol. 2, 2018,
5 Merkulov, P.; “The Staggering Costs of www.isaca.org/archives
Non-Compliance,” SC Magazine, 1 May 2018, 14 Payment Card Industry Security Standards
https://www.scmagazine.com/home/opinion/ Council, “Secure Software Lifecycle
executive-insight/the-staggering-costs-of- (Secure SLC) Requirements and
non-compliance/ Assessment Procedures,” January 2019,
6 Johansson, D.; “Agile vs. Security: Resolving https://www.pcisecuritystandards.org/
the Culture Clash,” Synopsys, 5 May 2016, documents/PCI-Secure-SLC-Standard-v1_0.pdf
https://www.synopsys.com/blogs/software-
security/agile-vs-security/
7 National Institute of Standards and Technology,
Special Publication (SP) 800-55 Rev. 1,
Performance Measurement Guide for Information
Security, USA, July 2008, https://csrc.nist.gov/
publications/detail/sp/800-55/rev-1/final

ISACA JOURNAL VOL 4 47


FEATURE

Analyst and Adversary


Deconstructing the “Imaginary” of Security and
Cybersecurity Professionals

beyond certain ethical limits on security and


Disponible también en español cybersecurity practice. Nonetheless, the study of
Do you have
Each year, reports of new threats and security adversaries and their attack methods forms an
something
to say about this breaches reveal the ever-increasing sophistication integral part of security and control practice—not
article? of attackers and their methods for outwitting only because attacks create the very instability that
available control mechanisms.1, 2 These security professionals are dedicated to avoiding, but
Visit the Journal pages also because studying and emulating attacks, in
of the ISACA® website developments reflect the evolution of an adversary
who constantly strives to find novel, surprising controlled circumstances, can provide valuable
(www.isaca.org/journal),
attack vectors and create instability across the insight to business and security leaders.
find the article and click
on the Comments link to corporate private sector, as well as the military and
share your thoughts. governments at national, state and local levels. Many security analysts advance the professional
vocabulary of threats, controls and impacts—that is,
https://bit.ly/2HIdw8H
Security and cybersecurity researchers attempt to those on the light side of the force, so to speak—
study the mind-set of attackers—hoping to guided by ethics and adherence to regulations.
understand how they think, reflect, develop Other so-called analysts allow themselves to be
strategies and act. However, the field is generally tempted by the dark side; however, recognizing
characterized by conflicts and adverse conditions potential vulnerabilities in practice, their intentions
that few practitioners will find attractive; such shift, and their capabilities become ambiguous. The
research is inherently prone to overstepping ethical contrast captures certain unavoidable tensions that
boundaries that security and cybersecurity arise in the security profession: tension between the
specialists should respect when carrying out their necessity to take chances and understand the
professional duties.3 In this context, the attacker adversary, on the one hand, and risk aversion and
becomes at once close and distant, occupying a the duty to avoid exposure, on the other hand; and
zone of contradiction that prohibits any advancing tension between a mandate to achieve greater
reliability vs. an attitude of healthy skepticism and
imperfect trust4, 5 in a world that is ever more
hyperconnected, digitally transformed—and,
therefore, exploitable.

Certain conceptual foundations have remained


constant throughout the training and practice of
security and cybersecurity professionals—
foundations informing what might be called their
professional imaginary—that is, a certain inherited
perspective, received wisdom or set of assumptions
projected outward on a rapidly evolving world.
Comprehending and analyzing the security
imaginary can open a space for new options and
alternative considerations, making it possible to
reconstruct and validate previous knowledge and
Jeimy J. Cano M., Ph.D., Ed.D., CFE, CICA experience, better protect and secure organizations
Is professor at the school of law of the Universidad de los Andes, Colombia.
while advancing their digital strategies, and also
He has more than 22 years of experience as an executive, academic and
professional in the areas of information security, cybersecurity, forensic spark new debates on the way to defend and
computing, digital crime, critical infrastructures and IT auditing. preempt attacks in today’s asymmetrical and
uncertain world.

48 ISACA JOURNAL VOL 4


Education and Training: Forming the training—one that demands a different perspective
Professional Imaginary to recognize and understand new risk scenarios and Enjoying
emerging threats. Current professional frameworks
Constant change and adaption to the challenges of this article?
in both security and cybersecurity seek to create
the world increasingly require workers to become certainties and a feeling of control with the
life-long students.6 The traditional model of • Read Threat
understanding that, as good practices, the
education in which professors possess knowledge Intelligence.
frameworks are sufficient to affect reality and
and students passively receive and store their www.isaca.org/
preempt acts by adversaries. Standard practices
teaching tends to reproduce a homogeneous threat-intelligence
that currently inform the imaginary of security and
educational status quo; one that is becoming • Learn more about,
cybersecurity professionals must not become
steadily less relevant. In such circumstances, discuss and
dogmas and unquestionable truths; rather, they
students often essentially repeat or confirm the collaborate on
should be subject to review and analysis, constantly
accomplishments of their mentors in order to information and
reevaluated in the context of emerging professional
obtain the highest grades, awards and recognition cybersecurity in
experience and organizational dynamics.
from the institutions at which they study. This ISACA’s Online
educational model tends to assume—if not also re- Forums.
Professionals responsible for security must break
create—a mechanistic society in which it is possible https://engage.
away from the paradigm of known controls and
to forecast the behavior of the system and its isaca.org/online
allow themselves to be questioned and interrogated
participants. It presupposes a context for work and forums
by the volatile, uncertain, complex and ambiguous
learning that treats all learners identically, frequently experience of working in the field; in effect, they
ignoring any prior knowledge or individual need to uninstall the responses programmed and
characteristics, and molding their vision of the validated by their education and applied within their
world according to currently accepted standards— working contexts. They must invent alternatives
all in order to address issues or challenges with that are not simple reactions to unexpected events
solutions already known to the educators. but, instead, make it possible to anticipate, defend
and preempt the adversary’s moves, connecting the
disconnected dots in their environments and
THE DIGITAL creating an enriched vision for their
recommendations and actions. Practitioners must
ADVERSARY FEELS remember that an analyst’s success poses a new
COMFORTABLE WITH challenge to an adversary, i.e., an increase of the
attacker’s creativity to add tension to the new
UNCERTAINTY AND security and control policies.
INSTABILITY, IS NOT
The Digital Adversary and the Capacity to
AFRAID TO BE WRONG AND, Surprise
IN EACH OUTCOME, FINDS To protect and advance the value promise of the
AN OPPORTUNITY TO enterprise, security and cybersecurity specialists
seek to implement, secure, stabilize and protect
CAPITALIZE AND UPDATE assets under their care. All the while, their adversary
KNOWLEDGE. is continually preoccupied with experimenting,
surprising, destabilizing and compromising (that is,
breaching or outwitting known standards and
Education in security and cybersecurity was formed protections), naturally creating instability and
in this mold. Its frameworks and approaches to spreading uncertainty.
learning are all but unquestionable and dictate how
security specialists learn to make decisions. The digital adversary feels comfortable with
Aversion to risk, a need to control actions and uncertainty and instability, is not afraid to be wrong,
consequences, and fear of failure perceived as and, in each outcome, finds an opportunity to
inevitable condition the ways that security capitalize and update knowledge. The digital
practitioners respond in the face of a reality that is adversary accelerates learning, as well as
utterly different from the one which formed their constructive unlearning, through permanent testing

ISACA JOURNAL VOL 4 49


and experimentation and pursues or re-creates present, the possibilities open in a hyperconnected
contexts that, for others, may feel uncontrolled—all world and, above all, a systemic rationale that is not
with the goal of reaching new frontiers of based on fixed or mechanistic causality or an
knowledge that customary security practices and immutable reality governed by known laws but
science have (so far) not attained. This mode of rather one that is relational and emerging; is
thinking and acting emphasizes the development of capable of unifying vision in the midst of oddities,
critical capacity and an ongoing strategy to inconsistencies and contradictions;7 creates
supersede known truths and conventional wisdom. synthesis between reality and imagination;
The adversary exposes the status quo to new test transforms uncertainty into opportunity; creates
cases to find new opportunities, uncover conditions incentives; ruptures the status quo; and reveals
that lead to novel approaches and take the most what was heretofore impossible to see.
advanced digital protections by surprise. To Practitioners should remember that an adversary’s
understand what happened in the case of a breach, success represents a lesson learned to an analyst,
security professionals often head down a road that i.e., new motivations for the analyst to explore and
adversaries have already traveled. challenge previous knowledge.

The attacker understands security not as a final Analyst and Adversary: Integrating Two
objective to achieve, but as an incomplete journey;
Opposing Visions
preliminary and partial responses are the norm,
vulnerabilities require adaptive goals, and security Finding value in the methodology of adversaries is
demands lead to imperfect trust. The adversary’s not intended to romanticize or promote illegal
mind is restless; either it was never formed within activity. Rather, it illustrates how their methods,
the mentality and framework of traditional mind-set and culture can be repurposed to enrich
education, or it quickly outgrew them. Instead, the the education and training of security and
adversary responds to the adrenaline rush produced cybersecurity professionals. The old, static
by breaking existing protection paradigms. He or practices around controls (and their respective
she relishes a sense of permanent inevitability of verifications) will not be viable for 21st century
security failure as the new normal in the education organizations as a source of imperfect trust. In fact,
of security and control specialists. improving security and cybersecurity today will
depend on consciously and selectively integrating
these historically opposing roles.
UNDERSTANDING THE The analyst conventionally works across three
MIND OF THE ADVERSARY categories: threat, control and impact (i.e., a
common vocabulary, widely recognized and
CAN OPEN SPACE FOR accepted across enterprises). The adversary thinks
THE AUTHENTICALLY in terms of intention, capacity and vulnerability
(figure 1). The categories of the analyst generally
ENLIGHTENED TRAINING entail negative reactions to the open-ended,
OF THE SECURITY dynamic terms of the adversary. The analyst closes
off (or at least reduces) attack surfaces; the
AND CONTROL adversary emphasizes possibility, openness and
PROFESSIONALS. opportunity. Harmonizing these oppositions may
seem contradictory or counterintuitive, but for the
analyst, actually encourages a constructive
Yet, understanding the mind of the adversary can unlearning of existing assumptions and tactics that
open space for the authentically enlightened may be inherently weak by virtue of their
training of the security and control professionals. It standardization and ubiquity (i.e., their status as
can teach them to understand the instability of the best practice).

50 ISACA JOURNAL VOL 4


Figure 1—Analyst and Adversary: Integrating Two Opposing Visions
Actors
Analyst Adversary
Mechanical view: Linear Threat Intention Relational view: Circular
Control Capacity
Impact Vulnerability
Stance: Implement, secure Stance: Experiment, surprise
<--OPPOSING VISIONS-->
and protect and compromise
Figure 1 offers a pedagogical model to harmonize • Suspension—Conditioned by existing knowledge,
opposing visions. It graphically invites the analyst to reality is challenged or contradicted by new
supplement defensive postures with the more experience, which disrupts the inertia of current,
offensive outlook and behavior of the adversary. The accumulated wisdom. This break, a rupture in what
model intentionally escapes the analyst’s formerly was considered “real” or true, requires
psychological safe zone,8 invites decisions in the face existing practice to be questioned and encourages
of uncertain conditions, and creates new opportunity the analyst to identify aspects of the situation that
for analysts to “study the situation, define the are unknown, unresolved or undefined, relative to
problems, come to their own conclusions about the current standards and/or contexts. Uncertainty
actions to undertake, compare ideas, defend them creates tension in prior knowledge.
and rework them with new contributions.”9
• Connection—Novel experience is associated with
previous experience; comparisons are made and
Concretely, the new pedagogy rests on four stages
interrogated or tested in light of prior knowledge.
for transforming learning and incorporating
Trial and error are grasped as a process, creating
constructive unlearning (figure 2):

Figure 2—The Learning and Unlearning Process

Suspension:
Break with reality
in new experience Learning/Unlearning

Incorporation: Connection:
Appropriate and
structure
Individual Compare new
experience with
knowledge prior knowledge

Transformation:
Deepen and
construct
new knowledge

Source: Adapted from Reyes, A.; R. Zarama; “The Process of Embodying Distinctions: A Reconstruction of the Process of Learning,” Cybernetics and Human Knowing, vol. 5,
no. 3, 1 March 1998, https://www.ingentaconnect.com/contentone/imp/chk/1998/00000005/00000003/14. Reprinted with permission.

ISACA JOURNAL VOL 4 51


opportunities to learn and assimilate skills uncertainty and instability of emerging risk,
that gradually become proven practice. internalizing the adversary’s mind-set, and updating
Successful resolution of prior conflicts or prior knowledge—and its conceptual foundation—to
difficulty is evaluated as a basis for action in include elements of experimentation, surprise and
similar situations. even amazement.12

• Transformation—Uncertainty gradually yields to


Security and control managers should be less afraid
the construction of new knowledge. Known
that they will “lose sight of the shore” of
elements of practice, including current concepts
conventional standards and good practices and,
regarding threat and risk, are superseded and
instead, commit themselves to reinventing
discarded. New distinctions and categories lead
knowledge on the basis of present capacities and
to an emerging hypothesis that responds to—or
demands. Although security managers will never
accounts for—the anomalies, contradictions or
have everything they need to succeed in all
discontinuities of the new experience.
circumstances, they do have the ability to learn and
• Incorporation—A new information structure is unlearn and, thus, to envision what they want to
built from previous knowledge, codified and achieve, to construct forecasts, and understand that
disseminated. It incorporates new interpretations incidents are a natural part of the landscape for
and a renewed awareness of fragility and modern organizations.
asymmetry in the security field. While
acknowledging the inevitability of failure, the
analyst gains new perspectives on the practical THE MECHANISTIC
benefit of safeguarding the enterprise’s value
promise, which later assumes new urgency EDUCATION OF
and validity. The analyst’s responsibility and INFORMATION SECURITY
purpose appear more evident, especially in
uncertain situations. AND CYBERSECURITY
ANALYSTS REVEALS ITS
Rethinking education according to these principles
requires breaking with the current mechanistic INHERENT LIMITATIONS.
tradition, whose standards demand routine,
repeatable processes to measure levels of
protection—whether actual or aspirational—for the Analysts and adversaries share a foundation of
organization. The goal is to complement or expand knowledge and common challenges. Analysts
current approaches, privilege openness, anticipate should adopt the adversary’s tools wherever it
the actions of adversaries (and assess makes sense; leave their comfort zones; explore
consequences), tolerate calculated risk, emphasize different points of view (perhaps even from other
initiative and experimentation, and revise or update disciplines or intellectual positions); develop habits,
knowledge now and in the long term.10 attitudes, capacities and meanings to overcome
cognitive blindness;13 act preemptively; and,
Conclusions especially, stay ahead of the curve: preempt,
challenge, interpret, decide, (re)align and learn.
As risk and emerging threats increase—along with
legal requirements for compliance11—the
Endnotes
mechanistic education of information security and
cybersecurity analysts reveals its inherent 1 Accenture, The Post-Digital Era Is Upon
limitations. Current approaches to security and Us: Are You Ready for What’s Next?
control should become more forecasting and Accenture Technology Vision 2019,
preemptive, expanding the current educational https://www.accenture.com/t20190201
framework, which generally ensures good practices T224653Z__w__/us-en/_acnmedia/PDF-
that create certainties and calmness in decision- 94/Accenture-TechVision-2019-Tech-Trends-
making. Forecasting means recognizing, Report.pdf
confronting, learning and unlearning, engaging the

52 ISACA JOURNAL VOL 4


2 European Union Agency for Network and mandates of senior security and cybersecurity
Information Security (ENISA), ENISA management. See Edmondson, A.; The Fearless
Threat Landscape Report 2018: 15 Top Organization: Creating Psychological Safety in the
Cyberthreats and Trends, January 2019, Workplace for Learning, Innovation, and Growth,
https://www.enisa.europa.eu/publications/ John Wiley & Sons, USA, 2018,
enisa-threat-landscape-report- https://www.wiley.com/en-us/The+Fearless+
2018/at_download/fullReport Organization:+Creating+Psychological+Safety+in+
3 Do, Q.; B. Martini; K. R. Choo; “The Role of the the+Workplace+for+Learning,+Innovation,+and+
Adversary Model in Applied Security Research,” Growth-p-9781119477266
Computers & Security, vol. 81, March 2019, 9 Acosta, S.; Pedagogía por competencias:
https://eprint.iacr.org/2018/1189.pdf Aprender a pensar, Editorial Trillas, Mexico,
4 In a hyperconnected world, all participants are 2012, p. 47, www.etrillas.com.mx/
going to have some kind of failure and need to detalle.php?isbn=9786071713025&estilo=
act when this happens. Reliability is based on 13&tema=0
the impact of adverse actions and how to 10 Cano, J.; “La educación en seguridad de la
manage them. información. Reflexión pedagógicas desde el
5 Cano, J.; “Riesgo y seguridad. Un continuo de pensamiento de sistemas,” Memorias 3er
confianza imperfecta,” in Dams, A.; H. Pagola; Simposio Internacional en “Temas y problemas
L. Sánchez; J. Ramio; Actas IX Congreso de Investigación en Educación: Complejidad
Iberoamericano de Seguridad de la Información, y Escenarios para la Paz,” 2016,
Universidad de Buenos Aires–Universidad http://soda.ustadistancia.edu.co/enlinea/
Politécnica de Madrid, 2017, p. 34-39, congreso/congresoedu/2%20Pedagogia%20y
https://www.researchgate.net/publication/ %20dida%B4ctica/2%209%20LA%20
321197873_Riesgo_y_seguridad_Un_continuo_ EDUCACION%20EN%20SEGURIDAD%20DE%20
de_confianza_imperfecta LA%20INFORMACION.pdf
6 For example, two researchers note, “One of the 11 IT Governance, “Managing Cyber Risk:
most urgent challenges facing higher education Transform Your Security With Cyber Resilience,”
is how to respond to the unavoidable need to https://www.itgovernance.co.uk/managing-
modernize and improve the competencies of an cyber-risk
ever-greater number of people throughout both 12 One author celebrates the quality of
the length and breadth of their lives.” amazement in discovering what lies concealed
Echeverría, B.; P. Martínez; “Revolución 4.0, behind everyday experience—of perceiving, for
Competencias, Educación y Orientación,” the first time, what has been there all along.
Revista Digital de Investigación en Docencia See García, A.; Educar para el asombro.
Universitaria 12:2, Sencillez, confianza, paciencia y profundidad,
http://dx.doi.org/10.19083/ridu.2018.831 Mensajero, Spain, 2018, https://gcloyola.com/
7 Charan, R.; The Attacker’s Advantage: es/educacion/3139-educar-para-el-asombro-
Turning Uncertainty Into Breakthrough 9788427141759.html?search_query=educar+
Opportunities, Public Affairs, USA, 2015, para+el+asombro&results=302&, p. 116.
https://www.publicaffairsbooks.com/titles/ 13 Krupp, S.; P. Schoemaker; Winning the Long
ram-charan/the-attackers-advantage/ Game: How Strategic Leaders Shape the Future,
9781610394758/ Public Affairs, USA, 2014, https://www.public
8 The psychological safe zone is clearly affairsbooks.com/titles/steven-krupp/
understandable reactions to the interests and winning-the-long-game/9781610394475/

ISACA JOURNAL VOL 4 53


HELP
SOURCE
Q&A

We are an organization providing IT-based (IEC)’s ISO/IEC 38500 Information technology —

Do you have
Q services, but we belong to the small and
medium enterprise (SME) sector. Is enterprise
Governance of IT for the organization2 is the
standard for IT governance, and COBIT® 20193 is
something
to say about this governance of IT (EGIT) relevant for SME the framework for implementing IT governance
article? organizations? Are the available frameworks, within the organization.
particularly COBIT®, different for different
Visit the Journal pages organizations? The challenges faced by SMEs can be broadly
of the ISACA® website
viewed along two areas:
(www.isaca.org/journal),
find the article and click
on the Comments link to A EGIT is relevant and, in today’s environment, a
must for all types and sizes of organizations.
That said, organizations must choose the framework
• The ability to ensure that management is
cognizant of the value IT brings to the table
share your thoughts.
that they would like to adopt wisely. The decision to • Adequate resources on the IT team that make it
https://bit.ly/2I3pKYt
adopt a framework itself is a great step forward. capable to enable the previous point

Research on IT governance has typically been done Indeed, the primary focus of IT governance in COBIT
on large organizations. Research on smaller is value creation achieved by realizing benefits and
organizations has been limited, and research that optimizing risk and resources.
does comes to mind indicates that IT governance
structures in SMEs is quite limited. SMEs tend to SMEs generally face challenges in adopting COBIT
have an idiographic profile with characteristics that due to its generic nature. They are good at setting
differ strongly from large enterprises.1 business goals but find it difficult to set IT goals
since IT is a comparatively small function. But it is
Broadly speaking, SMEs differ from large interesting to see that many times their IT
organizations in many ways such as technology and investment as a percentage of overall investment is
environment, organizational size, and structural the same as any large enterprise.
differentiation. These, in turn, influence the nature of
instituted decision-making processes and structures, One COBIT user states that:
including IT. Governance structures in SMEs tend to
The organization must identify for itself
be characterized by centralized decision structures as
what it needs from IT and how expansion
opposed to the hierarchical and institutionalized
can serve those needs. Within this
decision structures of large organizations.
paradigm, however, COBIT® 5 offers a set of
structured processes to smooth the
IT governance is necessary to ensure that the
transition and ensure that such growth is a
business gains value through IT, which enhances
symptom of improvement, directed by a
shareholder value. It enables value creation by
knowledgeable and engaged board. In an
optimizing risk and the utilization of resources.
ongoing application of COBIT 5, in fact, this
This paradigm is true for all organizations that
should become a matter of course as the
depend on IT for competitive advantage, efficiency,
framework develops and provides the
effectiveness, compliance, security and reliability
components of a continual improvement
of data.
life cycle. This enables the enterprise to
fully leverage COBIT’s strengths, thereby
International Organization for Standardization
developing a mature, flexible and effective
(ISO)/International Electrotechnical Commission
IT function.4

A blog post summarizes that, “It really is a


Sunil Bakshi, CISA, CRISC, CISM, CGEIT, ABCI, AMIIB, BS misperception that COBIT® 5 and IT governance is
25999LI, CEH, CISSP, ISO 27001 LA, MCA, PMP only relevant to large organizations when, in reality,
Has worked in IT, IT governance, IS audit, information security and IT risk it is an equally if not more essential ingredient for
management. He has 40 years of experience in various positions in the SME.”5
different industries. Currently, he is a freelance consultant in India.

54 ISACA JOURNAL VOL 4


These suggestions should be considered while Considering the current trend of start-ups that bring
implementing IT governance in SMEs: innovative concepts and ideas to market, it is fair to
assume that more and more SMEs will be in
• SME senior management should be involved in IT
business. SMEs are essential for globalization and,
governance interactions with a focus on
therefore, they should focus on IT governance.
enhancing performance of IT efficiency,
effectiveness, reliability, security and compliance.
Endnotes
• Although SMEs, corporate executives and
operational executives are busy and small 1 Lee, M.; “IT Governance Implementation
in number, they should be involved in Framework in Small and Medium Enterprise,”
IT governance processes. International Journal of Management and
Enterprise Development, vol. 12, iss. 4-6, 2013,
• SMEs should develop and implement a https://www.inderscienceonline.com/doi/abs/
framework for risk management, defining 10.1504/IJMED.2013.056445
business goals and IT goals. 2 International Organization for Standardization/
International Electrotechnical Commission
• Communication of IT governance policies,
guidelines and practices within the organization ISO/IEC 38500 Information technology—
should be established using a number of Governance of IT for the organization,
accessible channels. https://www.iso.org/standard/62816.html
3 ISACA®, COBIT® 2019, USA, 2018, www.isaca.
• SMEs should develop and implement a org/COBIT
mechanism for performance monitoring of 4 Milner, L.; “COBIT 5 Advantages for Small
resources to optimize them. Enterprises,” COBIT Focus, 17 November 2014,
www.isaca.org/COBIT/focus/Pages/
• It is important to establish periodic review
meetings with corporate and operational COBIT-5-Advantages-for-Small-Enterprises.aspx
executives to make corrections in long-term 5 Lane, M.; “IT Governance for Small and Medium
strategies based on risk and performance Business,” Orbus Software, 5 September 2014,
monitoring. https://www.orbussoftware.com/blog/
it-governance-for-small-and-medium-business/

SEE YOU NEXT YEAR IN

B A LT I M O R E , M D
12-14 MAY 2020
Save US$500 when you register before
5 August 2019 with promo code NAC20SUMR
W W W. I S A C A . O R G / N A C A C S - J V 4

ISACA JOURNAL VOL 4 55


CROSSWORD
PUZZLE

by Myles Mellor
www.themecrosswords.com

ACROSS 1 2 3 4 5 6 7
1. Shared IT facility
8
3. IT base of operations that vendors are moving
away from, 2 words 9 10 11
9. Basic facilities and systems of operation in
an organization 12 13 14

12. View
15 16 17
13. Positioning app
15. Deep hole 18 19

17. Person of equal status or knowledge 20 21 22 23


18. London gardens
20. Consumer, 2 words 24 25

23. General rule intended to regulate activity 26 27 28 29 30


24. Test version
26. Internet for connection to remote servers, 31 32 33
used for storage purposes
34 35 36
28. EU law re: data protection, abbr.
30. Brit. leader 37 38 39
31. Phishing trick
40 41 42
32. Software program, briefly
34. Govern 43 44
35. Security executive whose role is well defined
45 46 47
in COBIT®
37. Choose for an executive position, say
39. Golden Rule conclusion 11. Old record
40. CV 14. Methods of operation
42. Equifax experienced a large and notorious one, 16. Merchandise ID
2 words
19. Berners-Lee creation
43. Separate out unwanted or malicious traffic
21. Twosome
45. Add, with up
22. Imposes rules
46. Legal thing, in Latin
23. ____less office
47. Key term for an IT audit
25. NFL stats
27. Words before "the minute" or "no good"
DOWN 29. Pixel density
1. ____ controlled 31. Turn
2. Like some goals 32. It should be securely protected
4. Using its own action or motion 33. Personality structure
5. Take advantage of 34. ISACA's good-practice framework
6. It IS above Shift, 2 words 36. Exclamation of surprise
7. Directed towards a certain organization, as in 38. State of being equal or equivalent
a cyberattack, for example 41. Poetic adverb for many times
8. Slips 42. The D in USD, abbr.
10. Start for COBIT, control and collaborate 44. Technical department

Answers on page 58

56 ISACA JOURNAL VOL 4


Take the
CPE QUIZ
quiz online. #185

https://bit.ly/2HGVuDO

Based on Volume 2, 2019—Tomorrow’s Security Today


Value—1 Hour of CISA/CRISC/CISM/CGEIT Continuing Professional Education (CPE) Credit

TRUE/FALSE SERRES ARTICLE

11. The two most significant challenges most organizations face


SAURBAUGH ARTICLE now that the EU General Data Protection Regulation (GDPR) is in
effect are cultural transformation and documenting compliance.
1. Enterprises should hire for security practitioners based on skill,
with personality as only a distant second priority. 12. Cultural transformation related to privacy is the same as for
other corporate values: It cannot be handled via training alone,
2. Realistic simulations such as phishing simulations are more
but must be embedded in every decision, small and large.
effective in educating employees about security than long,
drawn-out computer-based training.
BRUNSWICK ARTICLE
3. The security team should be solely responsible for developing
the appropriate and meaningful security metrics. 13. The US California Consumer Privacy Act (CCPA) requires any
organization with an annual gross revenue of US$1 million or
PUTRUS ARTICLE more doing business in the US state of California to comply
with stricter approaches to online privacy and processing of
4. Among the issues to be considered in justifying the chief
personal data.
information security officer (CISO) role within an enterprise are
14. The CCPA’s requirement for organizations to disclose
the number and monetary impact of security incidents,
categories of data collected is intended to cause
compliance with laws and regulations, and protection of the
organizations to be more selective in the amount and type of
enterprise’s reputation.
personal data they collect.
5. It is more suitable for the CISO to report to the audit committee
15. The GDPR’s financial penalty for failure to comply is more
than to the chief executive officer (CEO).
severe than the CCPA’s, but the CCPA grants individuals the
6. The CISO plays a key role in designing critical controls for
opportunity to receive compensation for infractions.
selected business units within the enterprise. His or her
success in doing so calls on his or her status as a trusted NACHIN, TANGMANEE AND PIROMSOPA ARTICLE
advisor.
16. The study described in the article investigates five
KEEF ARTICLE approaches to raising security awareness, based on differing
delivery methods: conventional, instructor-led, online, pre- and
7. Because data are the foundation of security programs and the
post-testing, and simulation-based.
necessary data are likely to come from a variety of vendors, it is
17. Instructor-led delivery was identified as the most effective in
important to normalize and merge the data and make the
raising awareness, followed by simulation-based activities.
resulting database product agnostic.
18. Further testing specific to Thailand demonstrated that
8. As useful as modeling can be, it cannot reveal the relationship
simulation-based delivery is more effective than instructor-led
between an asset and an indicator of compromise (IOC) and
delivery, but the most effective approach overall is an
the surrounding network topology and controls.
integration of both.
LEE ARTICLE
DURMISEVIC-MUTAPCIC ARTICLE
9. Although filling a cybersecurity position may be difficult, once
19. In compliance audits, root cause analysis can help the auditor
a cybersecurity employee is on board, he or she is likely to
determine the reasons for noncompliance and develop
stay for a long tenure and not engage in “job hopping.”
appropriate recommendations for controls to prevent or
10. Organizations that require a degree in computer science for
detect and correct recurrence of the outcomes leading to
cybersecurity positions are ignoring the multidisciplinary
noncompliance.
nature of cybersecurity and may be missing out on huge
20. Root cause analysis in IT audits is comparatively simpler than
pools of suitable candidates.
in other types of audits because the analysis stops at the
technology level.
21. Risk-based auditing requires the auditor to prove that a risk
has materialized in order to identify a finding.

ISACA JOURNAL VOL 4 57


THE ANSWER FORM CPE QUIZ
Based on Volume 2, 2019 #185

TRUE OR FALSE
SAURBAUGH ARTICLE BRUNSWICK ARTICLE Name
PLEASE PRINT OR TYPE
1.
13.
2.
14. Address
3.
15.

PUTRUS ARTICLE
NACHIN, TANGMANEE AND CISA, CRISC, CISM or CGEIT #
PIROMSOPA ARTICLE
4.

5. 16. Answers: Crossword by Myles Mellor


See page 56 for the puzzle.
6. 17.
1 2 3 4 5 6 7

18. C O L O
8
D A T A C E N T E R
L O L U B N A
KEEF ARTICLE 9
I N F R A S T R U
10
C T U R
11
E
12 13 14
M T P O S E E G P S
7. DURMISEVIC-MUTAPCIC 15 16 17
A B Y S S P E E R E Y
ARTICLE T
18
K E W
19
K T S
8. 20 21 22 23
E N D U S E R P R E C E P T
24 25
U B E T A Y D E
19. 26 27 28 29 30
C L O U D G D P R D P M
LEE ARTICLE P
31
R U S E
32
A P
33
P S
20. 34 35 36
C O N T R O L R C I S O
37 38 39
9. 21. 40
O
41
O
42
T A P C Y O U
B I O D A T A B R E A C H
43 44
10. 45
I F I
46
L T E R
47
S H I
T O T R E S I N S P E C T

Please confirm with other designation-granting professional bodies for their CPE qualification acceptance criteria. Quizzes may be submitted for grading
SERRES ARTICLE only by current Journal subscribers. An electronic version of the quiz is available at www.isaca.org/cpequiz; it is graded online and is available to all interested
parties. If choosing to submit using this print copy, please email, fax or mail your answers for grading. Return your answers and contact information by
email to info@isaca.org or by fax to +1.847.253.1755. If you prefer to mail your quiz, in the US, send your CPE Quiz along with a stamped, self-addressed
11. envelope, to ISACA International Headquarters, 1700 E. Golf Rd., Suite 400, Schaumburg, IL 60173 USA. Outside the US, ISACA will pay the postage to return
your graded quiz. You need only to include an envelope with your address. You will be responsible for submitting your credit hours at year-end for CPE
credits. A passing score of 75 percent will earn one hour of CISA, CRISC, CISM or CGEIT CPE credit.
12.

Get Noticed
Advertise in the ISACA® Journal

Journal
58 ISACA JOURNAL VOL 4
STANDARDS GUIDELINES
TOOLS AND TECHNIQUES

ISACA Member and Certification Holder Compliance IS Audit and Assurance Guidelines
The guidelines are designed to directly support the standards and help
The specialized nature of information systems (IS) audit and assurance practitioners achieve alignment with the standards. They follow the same
and the skills necessary to perform such engagements require standards categorization as the standards (also divided into three categories):
that apply specifically to IS audit and assurance. The development and
dissemination of the IS audit and assurance standards are a cornerstone
• General guidelines (2000 series)
of the ISACA® professional contribution to the audit community. • Performance guidelines (2200 series)
IS audit and assurance standards define mandatory requirements for • Reporting guidelines (2400 series)
IS auditing. They report and inform:
General
• IS audit and assurance professionals of the minimum level of 2001 Audit Charter
acceptable performance required to meet the professional 2002 Organizational Independence
responsibilities set out in the ISACA Code of Professional Ethics 2003 Professional Independence
2004 Reasonable Expectation
• Management and other interested parties of the profession’s 2005 Due Professional Care
expectations concerning the work of practitioners 2006 Proficiency
2007 Assertions
• Holders of the Certified Information Systems Auditor® (CISA®) 2008 Criteria
designation of requirements. Failure to comply with these standards
may result in an investigation into the CISA holder’s conduct by the
ISACA Board of Directors or appropriate committee and, ultimately, in Performance
disciplinary action. 2201 Engagement Planning
2202 Risk Assessment in Planning
2203 Performance and Supervision
ITAFTM, 3rd Edition (www.isaca.org/itaf) provides a framework for 2204 Materiality
multiple levels of guidance: 2205 Evidence
2206 Using the Work of Other Experts
IS Audit and Assurance Standards 2207 Irregularity and Illegal Acts
2208 Sampling
The standards are divided into three categories:
Reporting
• General standards (1000 series)—Are the guiding principles under 2401 Reporting
which the IS assurance profession operates. They apply to the 2402 Follow-Up Activities
conduct of all assignments and deal with the IS audit and assurance
professional’s ethics, independence, objectivity and due care as well IS Audit and Assurance Tools and Techniques
as knowledge, competency and skill. These documents provide additional guidance for IS audit and assurance
• Performance standards (1200 series)—Deal with the conduct of the professionals and consist, among other things, of white papers, IS
assignment, such as planning and supervision, scoping, risk and audit/assurance programs, reference books and the COBIT® 5 family of
materiality, resource mobilization, supervision and assignment products. Tools and techniques are listed under www.isaca.org/itaf.
management, audit and assurance evidence, and the exercising of
professional judgment and due care. An online glossary of terms used in ITAF is provided at www.isaca.org/glossary.

• Reporting standards (1400 series)—Address the types of reports,


means of communication and the information communicated. Prior to issuing any new standard or guideline, an exposure draft is
issued internationally for general public comment.

Please note that the guidelines are effective 1 September 2014. Comments may also be submitted to the attention of the Director,
Content Strategy, via email (standards@isaca.org); fax (+1.847.253.1755)
General or postal mail (ISACA International Headquarters, 1700 E. Golf Road,
1001 Audit Charter Suite 400, Schaumburg, IL 60173, USA).
1002 Organizational Independence
1003 Professional Independence Links to current and exposed ISACA Standards, Guidelines, and Tools
1004 Reasonable Expectation and Techniques are posted at www.isaca.org/standards.
1005 Due Professional Care
1006 Proficiency Disclaimer: ISACA has designed this guidance as the minimum
1007 Assertions level of acceptable performance required to meet the professional
1008 Criteria responsibilities set out in the ISACA Code of Professional Ethics.
ISACA makes no claim that use of these products will assure a
Performance successful outcome. The guidance should not be considered
1201 Engagement Planning inclusive of any proper procedures and tests or exclusive of other
1202 Risk Assessment in Planning procedures and tests that are reasonably directed to obtaining the
1203 Performance and Supervision same results. In determining the propriety of any specific procedure
1204 Materiality or test, the control professionals should apply their own professional
1205 Evidence judgment to the specific control circumstances presented by the
1206 Using the Work of Other Experts particular systems or IS environment.
1207 Irregularity and Illegal Acts

Reporting
1401 Reporting
1402 Follow-Up Activities

ISACA JOURNAL VOL 4 59


ISACA® Journal, formerly
Information Systems Control
Journal, is published by the ADVERTISERS/
Information Systems Audit WEBSITES
and Control Association®
(ISACA®), a nonprofit
organization created for the
public in 1969. Membership
in the association, a voluntary
organization serving
IT governance professionals,
Owl Cyber Defense www.OWLcyberdefense.com/diota 26
entitles one to receive an SCCE Corporatecompliance.org/ethicsinstitute 1
annual subscription to the
ISACA Journal.

Opinions expressed in the


ISACA Journal represent the
leaders and
supporters
views of the authors and
advertisers. They may differ
from policies and official
statements of ISACA and/or
the IT Governance Institute
and their committees, and
from opinions endorsed by
authors, employers or the Editor Tanja Grivicic Johannes Tekle, CISA, CFSA, CIA
editors of the Journal. ISACA Manish Gupta, Ph.D., CISA, CRISC, Nancy Thompson, CISA, CISM,
Jennifer Hajigeorgiou CISM, CISSP CGEIT, PMP
Journal does not attest to the publication@isaca.org Mike Hansen, CISA, CFE Smita Totade, Ph.D., CISA, CRISC,
originality of authors’ content.
Jeffrey Hare, CISA, CPA, CIA CISM, CGEIT
Managing Editor Sherry G. Holland Jose Urbaez, CISA, CRISC, CISM, CGEIT,
© 2019 ISACA. All rights reserved. Jocelyn Howard, CISA, CISMP, CISSP CSXF, ITIL
Maurita Jasper
Francisco Igual, CISA, CGEIT, CISSP Ilija Vadjon, CISA
Instructors are permitted to Jennifer Inserro, CISA, CISSP Sadir Vanderloot Sr., CISA, CISM, CCNA,
photocopy isolated articles for Assistant Editor Khawaja Faisal Javed, CISA, CRISC, CBCP, CCSA, NCSA
noncommercial classroom use Safia Kazi ISMS LA Rajat Ravinder Varuni, CEH, DOP, DVA,
without fee. For other copying, Mohammed J. Khan, CISA, CRISC, CIPM GPEN, SAA, SAP, SCS, SOA
reprint or republication, Contributing Editors Farzan Kolini, GIAC Varun Vohra, CISA, CISM
permission must be obtained Shruti Kulkarni, CISA, CRISC, CCSK, ITIL Manoj Wadhwa, CISA, CISM, CISSP,
n writing from the association. Sunil Bakshi, CISA, CRISC, CISM, CGEIT, Bhanu Kumar ISO 27000, SABSA
Where necessary, permission ABCI, AMIIB, BS 25999 LI, CEH, CISSP, Hiu Sing (Vincent) Lam, CISA, CPIT(BA), Kevin Wegryn, PMP, Security+, PfMP
is granted by the copyright ISO 27001 LA, MCA, PMP ITIL, PMP Tashi Williamson
owners for those registered Ian Cooke, CISA, CRISC, CGEIT, COBIT Edward A. Lane, CISA, CCP, PMP Ellis Wong, CISA, CRISC, CFE, CISSP
with the Copyright Clearance Assessor and Implementer, CFE, Romulo Lomparte, CISA, CRISC, CISM,
Center (CCC) (www.copyright.
CIPM, CIPP/E, CPTE, DipFM, FIP, ITIL CGEIT, COBIT 5 Foundation, CRMA, ISACA Board of Directors
Foundation, Six Sigma Green Belt IATCA, IRCA, ISO 27002, PMP
com), 27 Congress St., Salem,
K. Brian Kelly, CISA, CSPO, MCSE,
(2019-2020)
MA 01970, to photocopy Larry Marks, CISA, CRISC, CGEIT
Security+ Tamer Marzouk, CISA, ABCP, CBAP Chair
articles owned by ISACA, Vasant Raval, DBA, CISA Brennan P. Baybeck, CISA, CRISC,
Krysten McCabe, CISA
for a flat fee of US $2.50 per Steven J. Ross, CISA, CBCP, CISSP CISM, CISSP
Brian McLaughlin, CISA, CRISC, CISM,
article plus 25¢ per page. CIA, CISSP, CPA
Send payment to the CCC Advertising Brian McSweeney Vice-Chair
stating the ISSN (1944-1967), Irina Medvinskaya, CISM, CGEIT, FINRA, Rolf von Roessing, CISA, CISM, CGEIT,
date, volume, and first and media@isaca.org Series 99 CISSP, FBCI
last page number of each Mike Michlowski, CISA, CRISC, CISM,
article. Copying for other than Media Relations CGEIT, CCSP, CFE, CIA, CIPM, CIPP/G, Director
personal use or internal news@isaca.org CIPP/US, CIPT, CISSP, CRMA Tracey Dedrick
reference, or of articles or David Earl Mills, CISA, CRISC, CGEIT, MCSE
columns not owned by the Robert Moeller, CISA, CISSP, CPA, CSQE Director
association without express
Reviewers David Moffatt, CISA, PCI-P Pam Nigro, CISA, CRISC, CGEIT, CRMA
permission of the association Matt Altman, CISA, CRISC, CISM, CGEIT Ramu Muthiah, CISM, CRVPM, GSLC,
or the copyright owner is Sanjiv Agarwala, CISA, CISM, CGEIT, CISSP, ITIL, PMP Director
expressly prohibited. ITIL, MBCI Ezekiel Demetrio J. Navarro, CPA, CISA, R. V. Raghu, CISA, CRISC
Vikrant Arora, CISM, CISSP CRISC, CISM, CGEIT, CISSP
ISSN 1944-1967 Sunil Bakshi, CISA, CRISC, CISM, CGEIT, Jonathan Neel, CISA Director
ABCI, AMIIB, BS 25999 LI, CEH, CISSP, Jacky Y. K. Ng, CISM, COBIT Assessor, Gabriela Reynaga, CISA, CRISC,
ISO 27001 LA, MCA, PMP AgilePM, CEng, CMgr, FCMI, ISO 9001 COBIT 5 Foundation, GRCP
Brian Barnier, CRISC, CGEIT and ISO/IEC 27001 LA, ITIL Expert,
Ronald Bas, CISSP MHKIE, MIET, PRINCE2, RPE Director
Pascal A. Bizarro, CISA Nnamdi Nwosu, CISA, CRISC, CISM, CGEIT, Gregory Touhill, CISM, CISSP, Brigadier
Jerome Capirossi, CISA PfMP, PMP General United States Air Force (ret.)
Anand Choksi, CISA, CCSK, CISSP, PMP Ganiyu Babatunde Oladimeji, CISA, CRISC,
Joyce Chua, CISA, CISM, PMP, ITILv3 CISM Director
Ashwin K. Chaudary, CISA, CRISC, CISM, Anas Olateju Oyewole, CISA, CRISC, CISM, Asaf Weisberg, CISA, CRISC, CISM, CGEIT
CGEIT CISSP, CSOE, ITIL
Burhan Cimen, CISA, COBIT Foundation, David Paula, CISA, CRISC, CISSP, PMP Director
ISO 27001 LA, ITIL, PRINCE2 Pak Lok Poon, Ph.D., CISA, CSQA, MIEEE Tichaona Zororo, CISA, CRISC, CISM,
Ken Doughty, CISA, CRISC, CBCP John Pouey, CISA, CRISC, CISM, CIA CGEIT, COBIT 5 Assessor, CIA, CRMA
Subscription Rates: Nikesh L. Dubey, CISA, CRISC, CISM, CISSP Steve Primost, CISM
Robert Findlay Parvathi Ramesh, CISA, CA Director and Chief Executive Officer
US: John Flowers, CISA, CRISC Antonio Ramos Garcia, CISA, CRISC, CISM, David Samuelson
one year (6 issues) $85 Jack Freund, Ph.D., CISA, CRISC, CISM, CDPP, ITIL
CIPP, CISSP, PMP Sheri L. Rawlings, CGEIT Director and ISACA Board Chair 2018-2019
All international orders: Sailesh Gadia, CISA Ron Roy, CISA, CRP Rob Clyde, CISM
one year (6 issues) $100 Amgad Gamal, CISA, COBIT Foundation, Louisa Saunier, CISSP, PMP, Six Sigma
CEH, CHFI, CISSP, ECSA, ISO 2000 Green Belt Director and ISACA Board Chair 2015-2017
Remittance must be made LA/LP, ISO 27000 LA, MCDBA, MCITP, Daniel Schindler, CISA, CIA Chris Dimitriadis, Ph.D., CISA, CRISC, CISM
in US funds. MCP, MCSE, MCT, PRINCE2 Sandeep Sharma, CISA, BEPM, CQI, EFQM,
Robin Generous, CISA, CPA IRCA, ISO 27000 LA, ITIL, MCP(BI),
Tushar Gokhale, CISA, CISM, CISSP, MLE, MSP, OSCJP, PRINCE2
ISO 27001 LA Catherine Stevens, ITIL

60 ISACA JOURNAL VOL 4


ISACA
BOOKSTORE
RESOURCES FOR YOUR PROFESSIONAL DEVELOPMENT

CISA JOB PR ACTICE


H AS CH A NGED!
AND SO HAS THE
E X A M P R E P.
We’ve got you covered—only official exam prep solutions from ISACA
reflect the most up-to-date training available and industry trends
impacting the IS/IT audit profession. Count on ISACA test prep
for all your study needs!

TR AINE D BY ISACA. CE RTIFIE D BY ISACA.

BROWSE A VARIETY OF PUBLICATIONS FEATURING THE LATEST RESEARCH AND


EXPERT THINKING ON STANDARDS, BEST PRACTICES, EMERGING TRENDS AND MORE AT
ISACA.ORG/BOOKSTORE

S-1
FEATURED PUBLICATIONS
CISA Review Manual, 27th Edition CISA Review Questions, Answers & Explanations
This manual is an extensive reference guide designed to help Database—12-Month Subscription
individuals prep for the CISA exam and understand the roles and This online database subscription is a comprehensive
responsibilities of an information systems (IS) auditor. The CISA 1,000-question pool of items that contains the questions & answers
Review Manual, 27th Edition is the most current, comprehensive from the CISA Review Questions, Answers & Explanations Manual,
and peer-reviewed IS audit, assurance, security and control 12th Edition. CISA exam candidates can prep for the exam on
resource available worldwide. With an easy-to-navigate format their schedule and at their own pace with this online study tool.
designed to assist candidates in understanding essential Utilize the interactive planner to build a custom study plan. The
concepts and studying the new 2019 CISA job practice areas. personalized dashboard then serves as the primary method to
Also includes definitions of terms most commonly found on navigate candidate’s studies and track progress.
the exam.
Take sample exams with randomly selected questions and view the
Print Product Code: CRM27ED
Updated for
2019
results by job practice domain, this allows for concentrated study
eBook Product Code: EPUB_CRM27ED
CISA
Job Practice

Member: $109 in particular areas. Additionally, questions generated during a study


Review Manual
27th Edition
Non-member: $139 session are sorted based on previous scoring history, providing
CISA candidates insights to identify strengths and weaknesses
CISA® Review Manual 27th Edition

Exam Prep
by ISACA

Print and eBook available in which gives them the ability to customize and focus their study
additional languages! efforts even further.

Print Product Code: XMXCA16-12M


Member: $299
CISA Review Questions, Answers & Explanations Manual 11th Edition

Non-member: $349

CISA
3701 Algonquin Road | Suite 1010
Rolling Meadows, IL 60008 | USA ®

CISA Review Questions, Answers & Explanations


P: +1.847.660.5505
F: +1.847.253.1755
Support: support.isaca.org
Website: www.isaca.org

Manual, 12th Edition


Review Questions, Answers
& Explanations Database

Updated
with additional

This manual consists of 1,000 multiple-choice study questions


questions!

and are presented by the five CISA job practice areas as well as
in a 150-question sample exam. The questions, answers and
explanations are intended to introduce the CISA candidate to the
types of questions that appear on the CISA exam. The practice
test included helps individuals determine their strengths and
weaknesses to identify any areas that require further study. This
publication is ideal to use in conjunction with the CISA Review
Manual, 27th Edition. Also includes definitions of terms most
commonly found on the exam.

Print Product Code: QAE12ED


Member: $129
CISA Review Questions, Answers & Explanations Manual 11th Edition

Non-member: $159

Available in additional languages!


CISA
®

Review Questions, Answers & Explanations Manual


11th Edition

Updated
with additional
questions!

ORDER ONLINE AT WWW.ISACA.ORG/BOOKSTORE


S-2
CISA Review Questions, Answers & Explanations CISA Virtual Instructor-led Training
Database—6-Month Subscription Join an expert CISA-certified trainer and fellow exam candidates
The CISA Review Questions, Answers & Explanations Database— for a unique, online exam-prep experience. This intensive virtual
6-Month Extension should be purchased only as an extension to instructor-led course will cover some of the more challenging
the CISA Practice Question Database—12-Month Subscription. topics from the CISA job practice. Drill through sample exam
items, interact and ask your most pressing questions and get the
Product Code: XMXCA16-EXT180 answers to build your confidence as you prepare for exam day.
Member: $69
CISA Review Questions, Answers & Explanations Manual 11th Edition

Non-member: $89 Member: $995


Non-member: $1,195

CISA
®

Review Questions, Answers


& Explanations Database

Updated
with additional
questions!

CISA Online Review Course


This on-demand CISA prep course incorporates videos, narrated CISA Training Week Courses
interactive eLearning modules, interactive workbooks and job
aids, case study activities, and pre- and post-course assessments. ISACA’s CISA Training Week Courses are delivered by world-
Exam candidates can navigate the online course at their own renowned, expert practitioners and combine group discussion,
pace, following a recommended structure, or target preferred job case studies and best practices to enhance your knowledge and
practice areas. They also have the ability to start and stop the skills. Each feature four full 8-hour days of expert, relevant and
course based on their study schedule, picking up exactly where impactful training and education.
they left off the next time they access it. The course covers all five
Member: $2,295
of the CISA domains and each section corresponds directly to the Non-member: $2,495
CISA job practice.

Member: $795
Non-member: $895

ORDER ONLINE AT WWW.ISACA.ORG/BOOKSTORE


S-3
COBIT® 2019 Framework: Introduction and COBIT® 2019 Framework: Governance and
Methodology Management Objectives
Over the years, best-practice frameworks have been developed COBIT is a framework for the governance and management
and promoted to assist in the process of understanding, designing of enterprise information and technology, aimed at the whole
and implementing enterprise governance of IT (EGIT). COBIT 2019 enterprise. Enterprise I&T means all the technology and information
builds on and integrates more than 25 years of development in this processing the enterprise puts in place to achieve its goals,
field, not only incorporating new insights from science, but also regardless of where this happens in the enterprise. In other words,
operationalizing these insights as practice. enterprise I&T is not limited to the IT department of an organization,
• New concepts are introduced and terminology is explained— but certainly includes it.
the COBIT Core Model and its 40 governance and
COBIT 2019 Framework: Governance and Management Objectives,
management objectives provide the platform for establishing
contains a detailed description of the COBIT Core Model and its
your governance program
40 governance and management objectives. A description of
• The performance management system is updated and allows each objective, its purpose, and its connection with enterprise and
the flexibility to use maturity measurements as well as alignment goals along with sample metrics are provided. For each
capability measurements objective, the process, practices, activities, and related guidance to
• Introductions to design factors and focus areas offer other standards and frameworks are also provided.
additional practical guidance on flexible adoption of COBIT
2019, whether for specific projects or full implementation COBIT defines the components to build and sustain a governance
system: processes, organizational structures, policies and
Print Product Code: CB19FIM procedures, information flows, culture and behaviors, skills, and
COBIT® 2019 FRAMEWORK: Introduction and Methodology

Member Price: $60.00 infrastructure. This publication also includes detailed information
FRAMEWORK

Introduction and
Methodology Non-member Price: $75.00 about each of the components relevant to each governance and
management objective.
Web Download Product Code: WCB19FIM
Member price: Free
Print Product Code: CB19FGM
Non-member price: Free
COBIT® 2019 FRAMEWORK: Governance and Management Objectives

Member Price: $60.00


FRAMEWORK

Governance and
1700 E. Golf Road, Suite 400
Schaumburg, IL 60173, USA

P: +1.847.660.5505
F: +1.847.253.1755
Management Objectives Non-member Price: $75.00
Support: support.isaca.org
Website: www.isaca.org

Web Download Product Code: WCB19FGM


Member price: Free
Non-member price: Free
COBIT® 2019 Design Guide: Designing an
Information and Technology Governance Solution
This publication is a breakthrough publication for the COBIT
framework. Since there is no such thing as a one-size-fits-all
governance system for enterprise I&T, every organization must COBIT® 2019 Implementation Guide: Implementing
uniquely tailor its governance system in order to maximize value and Optimizing an Information and Technology
out of its uses of I&T. The COBIT 2019 Design Guide provides a
Governance Solution
blueprint for enterprises through the use of “design factors.”
COBIT 2019 Implementation Guide: Implementing and Optimizing
If you are a direct stakeholder in governance over enterprise I&T, an Information and Technology Governance Solution picks up
COBIT 2019 Design Guide and its insights can help you to create where the COBIT 2019 Design Guide ended—you have designed a
a governance program that generates tremendous value from customized governance system for your enterprise, now how do
information and technology, wherever these valuable assets may you effectively implement it? This publication is not intended to be
be located within your organization. a prescriptive approach or the complete solution, but rather a guide
to avoid pitfalls, leverage the latest good practices, and assist in
Print Product Code: CB19DGD the creation of successful governance and management outcomes
Member Price: $70.00
DESIGN GUIDE

Designing an Information over time. To an important extent, it works in conjunction with the
COBIT® 2019 DESIGN GUIDE

and Technology
Non-member Price: $100.00
Governance Solution
COBIT 2019 Design Guide, which helps every enterprise to identify
Web Download Product Code: WCB19DGD and apply its own specific plan or road map.
Member price: Free COBIT2019_ImplementGuide.pdf 1 10/1/18 10:53 AM

Non-member price: $90.00 IMPLEMENTATION GUIDE


Print Product Code: CB19IGIO
Member Price: $60.00
COBIT® 2019 IMPLEMENTATION GUIDE

Implementing and
Optimizing an Information
Non-member Price: $75.00
1700 E. Golf Road, Suite 400

and Technology
Schaumburg, IL 60173, USA

P: +1.847.660.5505

Governance Solution
F: +1.847.253.1755
Support: support.isaca.org
Website: www.isaca.org

Web Download Product Code: WCB19IGIO


CM

MY

CY

CMY

Member price: Free


Non-member price: $55.00

ORDER ONLINE AT WWW.ISACA.ORG/BOOKSTORE


S-4
CHOOSE THE
C O U R S E S T H AT F I T Y O U R
CURRENT GOALS.
DEVELOP THE
E X P E RT I S E TO S H A P E YO U R
FUTURE ROLE.

DELOITTE/ISACA Advanced IT Auditing: Taking the Next Information Security Essentials:


Step in Accelerating Your Knowledge Enhance Your Ability to Advise on
TRAINING COURSES Dallas, TX | 23 – 26 September 2019 Information Security Decisions
Earn up to 32 CPEs for each Los Angeles, CA | 11 – 14 December 2019
4-day course Cloud Computing for Auditors: Seeing
Through the Clouds Network Security Auditing: Step into
ISACA Members: $2,495 USD Chicago, IL | 21 – 24 October 2019 a Hacker’s Mindset
Non-Members: $2,695 USD Seattle, WA | 12 – 15 August 2019

$200 USD Early Bird discount IA Data Analytics & Automation:


rates available—visit Enabling the Internal Audit of the Future Privacy and Data Protection: An
www.isaca.org/training2019jv4 Boston, MA | 19 – 22 August 2019 Introduction to the Global Landscape
of Data Privacy
Costa Mesa, CA | 28 – 31 October 2019

ISACA CISA® Bootcamp Cybersecurity Fundamentals


Phoenix, AZ | 2 – 5 December 2019 Washington, DC | 23 – 26 September
TRAINING COURSES Austin, TX | 4 – 7 November
Earn up to 32 CPEs for each CRISC™ Bootcamp
4-day course Chicago, IL | 5 – 8 August 2019 Foundations of IT Risk Management
Chicago, IL | 5 – 8 August 2019
ISACA Members: $2,295 USD
Non-Members: $2,495 USD COBIT® 2019 Overview & Foundation
Exam Prep Fundamentals of IS Audit & Assurance
$200 USD Early Bird discount Chicago, IL | 5 – 8 August 2019 Chicago, IL | 5 – 8 August 2019
and group rates available—visit Phoenix, AZ | 2 – 5 December 2019
www.isaca.org/training2019jv4

S E E W H AT’S N E X T N O W A N D R E G I S T E R AT
w w w. i s a c a . o r g / t r a i n i n g 2 019jv4

*Please see website for pricing and registration details. Information is subject to change.
INTRODUCING
COBIT 2019
The globally recognized COBIT® Framework has been updated
with new information and guidance—COBIT 2019 extends its
leading role in implementing and ensuring effective enterprise
governance of information and technology (EGIT).

COBIT 2019 is an evolution of COBIT 5, so this newly revised


governance framework contains everything you love about
COBIT 5, plus many new exciting features and focus areas.

C O B I T 2 0 1 9 C O R E P U B L I C AT I O N S

LEVERAGE COBIT 2019 TO GENERATE TREMENDOUS VALUE FOR YOUR ENTIRE ENTERPRISE BY
CUSTOMIZING AND RIGHT-SIZING THE GOVERNANCE OF INFORMATION AND TECHNOLOGY.

For more information on COBIT 2019, its publications and guidance,


and new training opportunities, go to www.isaca.org/COBITjv4

Das könnte Ihnen auch gefallen