Page 84 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 84

under the CISO that focuses on physical security. Another potential
               term for the CISO is information security officer (ISO), but this also

               can be used as a subposition under the CISO.

               Elements of security management planning include defining security
               roles; prescribing how security will be managed, who will be
               responsible for security, and how security will be tested for
               effectiveness; developing security policies; performing risk analysis;
               and requiring security education for employees. These efforts are

               guided through the development of management plans.
               The best security plan is useless without one key factor: approval by

               senior management. Without senior management’s approval of and
               commitment to the security policy, the policy will not succeed. It is the
               responsibility of the policy development team to educate senior
               management sufficiently so it understands the risks, liabilities, and
               exposures that remain even after security measures prescribed in the

               policy are deployed. Developing and implementing a security policy is
               evidence of due care and due diligence on the part of senior
               management. If a company does not practice due care and due
               diligence, managers can be held liable for negligence and held
               accountable for both asset and financial losses.

               A security management planning team should develop three types of
               plans, as shown in Figure 1.3.
























               FIGURE 1.3 Strategic, tactical, and operational plan timeline
               comparison
   79   80   81   82   83   84   85   86   87   88   89