11.07.2015 Views

Cyber Security Capability Framework & Mapping of ISM Roles - agimo

Cyber Security Capability Framework & Mapping of ISM Roles - agimo

Cyber Security Capability Framework & Mapping of ISM Roles - agimo

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

INFORMATION TECHNOLOGY SECURITY MANAGER/ADVISOROverview <strong>of</strong> the roleStaff in this role work report directly to the Chief Information Officer (CISO). ITSAs and ITSMs are executives within an agency that act as a conduit between the strategicdirections provided by the CISO and the technical efforts <strong>of</strong> Information Technology <strong>Security</strong> Officers. The main area <strong>of</strong> responsibility <strong>of</strong> an ITSA/ITSM is that <strong>of</strong> theadministrative controls relating to information security within the agency.ITSA/ITSMs should not have additional responsibilities beyond those needed to fulfil the role and the role should be undertaken by personnel with an appropriate level <strong>of</strong>authority based on the size <strong>of</strong> the agency or their area <strong>of</strong> responsibility within an agency. Where there are multiple ITSMs within an agency, there must also be adesignated ITSA (Information Technology <strong>Security</strong> Advisor). Where there is only one ITSM within an agency, that role automatically includes the role <strong>of</strong> ITSA. The ITSA isresponsible for the coordination and oversight <strong>of</strong> other ITSMs within the agency and has overall responsibility for information technology security management. In all otherrespects, the ITSA has the same role responsibilities as an ITSM. In some agencies the ITSA may be appointed at the EL2 level while the ITSMs are appointed at the EL1level. ITSMs may also be appointed at the EL2 level where appropriate.ITSA/ITSMs must be cleared for access to all information processed by the agency’s systems and able to be briefed into any compartmented information on the agency’ssystems.Required capabilitiesService DeliverySupports System <strong>Security</strong>1. Reviews reports on, or analyses information on, security incidents and patterns todetermine remedial actions to correct vulnerabilities.Delivers Service Excellence1. Develops and manages customer service performance requirements forinformation security.2. Ensures information ownership responsibilities are established for eachinformation system and implements a role based access scheme.3. Liaises with stakeholders to establish mutually acceptable contracts and serviceagreements.Leads and Develops People1. Performs project management duties where appropriate.2. Directs the implementation <strong>of</strong> appropriate operational structures and processes toensure an effective information security program.3. Provides direction to system developers and architects.4. Oversees an information security section.5. Acts as a mentor6. Co-ordinates communication, awareness and training in information security for the agencySupports Shared Purpose and Direction1. Develops strategies for ensuring the security <strong>of</strong> automated systems.2. Ensures that the policy and standards for security are fit for purpose, current and are correctlyimplemented.3. Reviews new business proposals and provides specialist advice on security issues andimplications.4. Advises the appropriate stakeholders <strong>of</strong> changes affecting the organisation’s informationtechnology security posture.5. Works with system owners to determine appropriate information security policies for theirsystems and to respond to recommendations from audits.6. Works with system owners to obtain and maintain the accreditation <strong>of</strong> their systems.7. Provides technical advice to committees, including other agency and inter-agency committeesas required.8. Maintains security knowledge base.Produced for AGIMO by Workplace Research Associates Pty Ltd 2010 Page 17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!