Information Security Multiprofile Maturity Model (ISM3)

被引:1
|
作者
Briceag, Valentin [1 ]
机构
[1] Univ Stat Moldova, Kishinev, Moldova
关键词
Information Security Management System (ISMS); Statement of Aplicability (SoA); Multipurpose Information Security Maturity Model (ISM3); Individual Information Security Profile (ISP); Information Security (InfoSec); target criteria evaluation; measurement criteria;
D O I
10.33436/v32i1y202208
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The paper examines a Multiple Profile Model of Information Security Maturity (ISM3), uncomplicated and clear, aimed at generating particular (Individual) Information Security Profiles (PISI). ISM3 is based on currently known best practices for information security / regulatory frameworks, e.g. OISM3: 2017, NIST SP 800-53 rev.5 (2020), NIST 800-207 Zero Trust Architecture (2020), ISO / IEC 27001: 2013, PCI-DSS 3.2.1 (2018), COBIT 5: 2012, COBIT: 2019, ISO / IEC 20000-1: 2018, ITIL v4: 2019 etc. The ISM3 flexibility allows the addition, deletion, modification of new structured knowledge concerning the existing threats and risks, controls and metrics expected for the assessment of InfoSec maturity level. ISM3 is accompanied by a software tool application, which allows the generation of individual security profiles for specific information of certain industries (PMSITI), e.g. education, banking, medicine; at a concrete entity level, e.g. State University of Moldova, commercial bank, private hospital; at some InfoSec subdivision or area levels/spheres, of an entity, e.g. the commercial payments department of the Commercial Bank or the information systems security area with specific requirements for the internal/external context, with target values of the evaluation criteria and specific metrics for criteria measurement. Furthermore, PISI can be used for measurement and assessment of InfoSec maturity either in internal self-assessment missions or in external conformity assessment missions and / or advisory missions and / or to compare the maturity of some typical organizations belonging to a certain industry. The PISI assessment report reflects the scope and current status of the InfoSec, the specific risks and threats, and suggests recommended targets for improvement.
引用
收藏
页码:99 / 112
页数:14
相关论文
共 50 条
  • [1] Maturity Model of Information Security for Software Developers
    Silva, M. P.
    Barros, R. M.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2017, 15 (10) : 1994 - 1999
  • [2] Organisational Information Security Management Maturity Model
    Zammani, Mazlina
    Razali, Rozilawati
    Singh, Dalbir
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (09) : 668 - 678
  • [3] Towards an Information Security Awareness Maturity Model
    Fertig, Tobias
    Schuetz, Andreas E.
    Weber, Kristin
    Mueller, Nicholas H.
    [J]. LEARNING AND COLLABORATION TECHNOLOGIES. HUMAN AND TECHNOLOGY ECOSYSTEMS, LCT 2020, PT II, 2020, 12206 : 587 - 599
  • [4] A cyclical evaluation model of information security maturity
    Rigon, Evandro Alencar
    Westphall, Carla Merkle
    Dos Santos, Daniel Ricardo
    Westphall, Carlos Becker
    [J]. Information Management and Computer Security, 2014, 22 (03): : 265 - 278
  • [5] Information Security Maturity Model for Healthcare Organizations in the United States
    Barnes, Bridget
    Daim, Tugrul
    [J]. IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2024, 71 : 928 - 939
  • [6] A Model to Assess the Maturity Level of the Risk Management Process in Information Security
    Mayer, Janice
    Fagundes, Leonardo Lemes
    [J]. 2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT - WORKSHOPS, 2009, : 61 - 70
  • [7] An Evolution Roadmap for Community Cyber Security Information Sharing Maturity Model
    Zhao, Wanying
    White, Gregory
    [J]. PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2369 - 2378
  • [8] An Information Security Maturity Evaluation Mode
    Ge Xiao-yan
    Yuan Yu-qing
    Lu Li-lei
    [J]. INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING 2011, 2011, 24 : 335 - 339
  • [9] Security Metrics Maturity Model for Operational Security
    Muthukrishnan, Murugarasan
    Palaniappan, Sellapan
    [J]. 2016 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS & INDUSTRIAL ELECTRONICS (ISCAIE), 2016, : 101 - 106
  • [10] Application of CobiT Maturity Model in Information Security Management and Arising Problematic Issues
    Nogicevs, Dmitrijs
    [J]. BALTIC JOURNAL OF MODERN COMPUTING, 2010, 757 : 53 - 63