Maturity Model for Information Security Capability..2
       We introduced an approach to building a maturity 
       model for Information Security Capability in our previous article. This 
       article will  provide a background to bring a larger section of the 
       readers of Naavi.org into the debate and also  fill up some of the 
       gaps left uncovered in the previous article so that experts can start 
       adding their thoughts.
       We have been discussing that Techno Legal 
       Information Security is a top management requirement in today's 
       information led business world. We have also been emphasizing that ITA 
       2008 has the effect of mandating Information Security and therefore 
       companies need to implement a ITA 2008 compliance programme before the 
       Clause 49 certification is due for the current financial year. We have 
       also brought in the element of "Behavioural Science" to the domain of 
       Information Security presenting a "Theory of Information Security 
       Motivation" identifying the motivational factors that determine the 
       successful implementation of IS practices in a company. 
       Now, under the the Maturity Model for Information 
       Security Capability (shall we call it IS-CMM ?.. so that we can 
       appreciate the relationship of this approach with the better known CMMI 
       or SEI CMM terms  used in software industry) we are exploring the 
       methods for measuring the IS capability of an organization. Ideally this 
       article should have appeared before the article that appeared on 6th but 
       we shall try to merge some of the essential parts of the earlier article 
       into this so that it will become a more comprehensive article.
     
     Software industry has successfully introduced the 
     concept of different levels of maturity in software development process 
     adopted by an organization to supplement its people and technology 
     resources. This People-Process-Technology combination is the foundation on 
     which a good software development company is built. The process capability 
     is measured on a five level tiered basis so that a CMM Level 5 company is 
     considered to have processes that have reached an optimization level in its 
     software development process.
     Level 1 is considered the initial start point for a 
     company where there may be no processes. At this initial level,  results of any project 
     may depend totally on the manager’s personal approach and the programmers’ 
     experience, meaning the success of a particular project can be repeated 
     only if the same managers and programmers are assigned to the next project. 
    
     A Company is recognized to have graduated to Level 2 
     when  project management technologies have been introduced in the 
       company  based on accumulated 
       experience and there are standards for produced software which  
       are documented. This enables the process to become "repeatable" without 
     the dependency on the same set of people.
    
     A Company graduates to Level 3 when  
       standards for the processes of software development and maintenance are 
       introduced and documented (including project management), There is a special quality management department for building and 
       maintaining these standards. The degree of organizational dependence on the qualities of 
       particular developers decreases and the process does not tend to roll 
       back to the previous level in critical situations.
    
     Level 4 is referred to as the "Managed Level" where there 
       are quantitative indices (for both software and process as a whole) 
       established in the organization. Better project management is achieved 
       due to the decrease of digression in different project indices. However, 
       sensible variations in process efficiency may be different from random 
       variations (noise), especially in mastered areas.
    
     When the company reaches Level 5, improvement 
       procedures are carried out not only for existing processes, but also for 
       evaluation of the efficiency of newly introduced innovative technologies. 
       The main goal of an organization on this level is permanent improvement 
       of existing processes. This should anticipate possible errors and defects 
       and decrease the costs of software development, by creating reusable 
       components for example. 
    
     Though the CMM does not by itself guarantee that a 
     "Good" software would be developed, nor it is meant to provide such a 
     guarantee,  the Certification of a Software Company under the CMM 
     methodology  has come to be considered an index of a Company's 
     capability.
     
     Naavi has always been of the opinion that "There is No 
     Quality without Security" and hence a quality process approach such as CMM 
     is expected to also consider that the process should have an inbuilt 
     "Security". Hence a CMM certification or a Six Sigma Certification ignoring 
     the Information Security aspects was always considered a faulty/inadequate 
     certification. However since the focus of CMM certification originated from 
     the need to strengthen the quality, it was natural that Security 
     orientation of a quality process can only come in as an "After thought". 
     
     It would be dysfunctional to start downgrading a CMM 
     Level 5 Company if its Information Security process is inadequate, if 
     unauthorized persons can hack into the company and say steal the source 
     codes etc. Hence we need to leave the quality certification methodologies 
     at the current practices though it remains "Quality Sans Security" and find 
     a parellel concurrent Security certification which grades the Security 
     Capability of a Company on a different scale. 
     
     For example, we may develop a separate metric for 
     Information Security Achievements such as (for argument) Level 1 of ISO 
     27001, Level 2 of ISO 27001 etc and evaluate a company from the perspective 
     of quality of processes on the basis of CMM and Quality of Security on the 
     basis of ISO (modified). The market may interpret the overall Quality cum 
     Security standing of the enterprise by looking at both parameters 
     simultaneously.
     
     What the author is  proposing under IS CMM is an 
     Information Security Capability Maturity Model which is aimed to assess the 
     IS achievements through  a combination of People, Process and 
     Technology.  
     
     Just as we say that "There is No Quality Without 
     Security", it is true that " There is No Security Without Quality". In fact 
     this is not just a statement born out of the management's intentions or 
     best practices, it is how the Techno Legal Security System recognizes 
     Security. The proof is available in the fact that under Section 66 of 
     Information Technology Act 2000 (ITA 2000) compliance of which is part of 
     the Techno Legal Information Security System, says that "Diminishing of the 
     value or Utility of information residing in a computer system" is a Cyber 
     Crime and if such a crime occurs in a Company the Company may have to bear 
     a financial liability leading to other adverse consequences affecting even 
     the BCP. "Quality" process is meant to maintain a certain level of value or 
     utility of the software. Therefore, when "Quality" is not maintained, the 
     "Value" of the software may be treated as "Diminished". In order to prevent 
     occurence of a crime (ie.,preventing the diminishing of value through 
     negligence in handling the quality process) the Security Process should 
     ensure that the Quality Process is not diluted. 
     
     It is therefore possible for the  IS CMM process to 
     integrate the current CMM process and become an "Integrated Organizational 
     Capability Maturity Model". Since we have conceded that the existing 
     CMM process need not be disturbed in the name of "Security", the 
     alternative possibility of integrating "CMM" as a quality parameter into 
     the "IS-CMM" needs to be seriously explored. We are addressing such an 
     approach in this model. 
     
     ISO 27001 incorporates "Technology". But its 
     inclusiveness may be inadequate when it comes to "People". The requirements 
     of "Policy Documents" under ISO 27001 does address "Process" but its end 
     objectives may be more focussed on the security domain only and unless 
     there is a strong bonding with the "Legal Compliance", the "Quality 
     Process" is not attracted within the ISO framework. Again, like the CMM 
     model, ISO 27001 has already matured to a certain level and any tinkering 
     of its process would again be creating more problems than it may solve.
     
     For this reason, it is better to find a solution to 
     grade companies on the basis of their Security Capability outside the ISO 
     framework. We shall therefore not attempt to find Level I, II, III.. etc  
     of ISO 27001.
     
     After eliminating the current CMM and ISO frameworks as 
     solutions for creating an evaluation and gradation system for a "Quality 
     Cum Security" capability of an organization, a possible solution appears to 
     be available with the Three Dimensional Information Security approach which 
     the author has presented earlier. 
     
     
     
     
      
     
      
     
     In the Three dimensional theory of Information Security 
     discussed earlier by this author, The Technical and Legal dimensions of 
     Information Security was further augmented by the Behavioural Science 
     dimension. 
     
     The hypothesis is that the way people behave to 
     different stimuli is an important factor to be considered for IS 
     implementation both for risk assessment and for mitigation strategies.
     
     The three dimensional model was supplemented by the 
     "Theory of Information Security Motivation" (TISM) under which it was 
     considered that the Information Security Motivation may be visualized as a  
     "Pentagon 
     
     
     
     Model" where it was suggested that  Information 
     Security adoption by individual employees may be mapped to five 
     motivational parameters namely,
     
       1. Awareness, 2. Acceptance 3. Availability, 4. 
       Mandate and 5. Inspiration.
       Unlike the normal motivational models, the model 
       suggested for visualization of this process for better understanding was 
       a “Pentagon” where each of the five factors were considered the sides 
       that bind the IS adoption process. This was different from the Maslow’s 
       pyramid/triangle model or any other forms of sequential adoption 
       of different factors
       Out of the, five IS motivational factors considered 
       above,  Awareness, Acceptance and Inspiration are related to 
       "People". "Availability" is related to "Technology". "Mandate" is related 
       to "Process". Hence, Naavi's Theory of Information Security Motivation (TISM) 
       already integrates the three important aspects of Corporate performance 
       namely "People", Process" and "Technology". If we build an IS-CMM model 
       based on the evaluation of Security Capability on the basis of TISM, we 
       will perhaps be creating a satisfactory model of evaluation of Corporate 
       performance.
       With this background let us now look at a suggested 
       Maturity Model for Information Security as shown below.
        
       
       In this model the five motivational factors have not 
       been combined but held independently. Also in order to differentiate the 
       levels of capability, instead of adopting a level across different 
       motivational parameters, a matrix type depiction is presented. 
       i.e., instead of saying that Company A is in IS CMM 
       Level I, Comany B is in IS CMM Level II and Company C is in IS CMM Level 
       III, the following matrix notation is used.
       Under this notation, Company A may 
       be depicted as a matrix element such as M1L2,M2L1,M3L3,M4L1,M5L1. Company 
       B is mapped as M1L1,M2L2,M3L2,M4L3,M5L2. Company C is mapped as 
       M1L4,M2L2,M3L4,M4L5,M5L2. [Alternatively, the notation can be IS CMM-L 
       (2.1.3.1.1)], etc
       This system of recording different maturity 
       capabilities in different maturity parameters recognizes that, IS 
       capability is dependent on human beings and hence the achievement of 
       capability is not entirely in the hands of the Company alone. While the 
       Company may invest in best security tools, create 100% awareness or even 
       mandate the IS practices, it has no control on two other parameters such 
       as “Acceptance” and “Inspiration”. These are dependent on the employees. 
       Hence it may not be possible for a company to reach say L5 in all 
       parameters simultaneously even after it exhausts all resources under its 
       capability.
       However, if the matrix notation is considered too 
       complicated for practical utility, it is suggested that it can be reduced 
       to a "Rating Notation"  For this purpose, the matrix elements may be 
       first reduced to a "Score" on a scale of 100. Then, the Company is 
       further evaluated on the following basis.
       
       1. Current Status of IS Capability Score (represented by 
       a score 0 to 100  divided into five grades A, B, C, D and E)
       2. Estimated Capability to retain or improve the 
       current status in the medium term with known business parameters, 
       (represented by one of the letters A to E indicating the level to which 
       it may tend in the medium term)
       3.Estimated Capability to retain or improve the 
       current status in the long term even when the current known business 
       parameters may undergo a change.(represented by one of the letters A to E 
       indicating the level to which it may tend in the medium term)
       
       Under this notation, the examples of how a IS 
       Capability Score may be presented by the Company would be AAA, BAA, CBA, EBB, DBA, etc
       I invite comments and suggestions on the above.
       P.S: This article refers to the following Four of my 
       earlier articles which provide the background.
       1. Techno 
       Legal Behavioural Science Approach to Information Security
       2. What 
       motivates an individual to adopt Security
       3. Theory 
       of Motivation based on Behavioural Science Approach
       4.
       
       
       
       IS Maturity Capability Model
       Those who have not browsed through these articles may 
       peruse the same.
       
 
              Naavi
     February 8, 2010
     
     
     
     Comments are Welcome at
      naavi@vsnl.com