<section title="3.3. Information Technology Security Managers"><subsection title="Objective"><paragraph
    title="3.3.1."


><![CDATA[<p>Information Technology Security Managers (ITSM) provide information security leadership and management within their agency.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="3.3.2."


><![CDATA[<p>This section covers the role of an ITSM with respect to information security within an agency.</p>]]></paragraph>
</block>
<block title="Information technology security managers"><paragraph
    title="3.3.3."


><![CDATA[<p>ITSMs are executives within an agency that act as a conduit between the strategic directions provided by the CISO and the technical efforts of systems administrators. The main area of responsibility of an ITSM is that of the administrative and process controls relating to information security within the agency.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Requirement for ITSMs"><paragraph
    title="3.3.4.R.01."

    tags="Governance"


><![CDATA[<p>When agencies outsource their ICT services, ITSMs should be independent of any company providing ICT services. This will prevent any conflict of interest for an ITSM in conducting their duties.</p>]]></paragraph>
<paragraph
    title="3.3.4.R.02."

    tags="Governance"


><![CDATA[<p>Ensure that the agency has a point of presence at sites to assist with monitoring information security for systems and responding to any information security incidents.</p>]]></paragraph>
<paragraph
    title="3.3.4.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="367"
><![CDATA[<p>Agencies MUST appoint at least one ITSM within their agency.</p>]]></paragraph>
<paragraph
    title="3.3.4.C.02."

    tags="Accreditation"


    classification="All Classifications"
    compliance="Must"
    cid="368"
><![CDATA[<p>ITSMs MUST be:</p><ul>
<li>cleared for access to all classified information processed by the agency’s systems; and</li>
<li>able to be briefed into any compartmented information on the agency’s systems.</li>
</ul>]]></paragraph>
<paragraph
    title="3.3.4.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="369"
><![CDATA[<p>Where an agency is spread across a number of geographical sites, it is recommended that the agency SHOULD appoint a local ITSM at each major site.</p>]]></paragraph>
<paragraph
    title="3.3.4.C.04."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="370"
><![CDATA[<p>The ITSM role SHOULD be undertaken by personnel with an appropriate level of authority and training based on the size of the agency or their area of responsibility within the agency.</p>]]></paragraph>
<paragraph
    title="3.3.4.C.05."

    tags="Governance"


    classification="All Classifications"
    compliance="Should Not"
    cid="371"
><![CDATA[<p>ITSMs SHOULD NOT have additional responsibilities beyond those needed to fulfil the role as outlined within this manual.</p>]]></paragraph>
</block>
<block title="Responsibilities – Security programs"><paragraph
    title="3.3.5.R.01."

    tags="Governance"


><![CDATA[<p>As ITSMs undertake operational management of information security within an agency they can provide valuable input to the development of the information security program by the CISO.</p>]]></paragraph>
<paragraph
    title="3.3.5.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="375"
><![CDATA[<p>ITSMs SHOULD work with the CISO to develop an information security program within the agency.</p>]]></paragraph>
<paragraph
    title="3.3.5.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="376"
><![CDATA[<p>ITSMs SHOULD undertake and manage projects to address identified security risks.</p>]]></paragraph>
</block>
<block title="Responsibilities – Working with ICT projects"><paragraph
    title="3.3.6.R.01."

    tags="Governance"


><![CDATA[<p>As ITSMs have knowledge of all aspects of information security they are best placed to work with ICT projects within the agency to identify and incorporate appropriate information security measures.</p>]]></paragraph>
<paragraph
    title="3.3.6.C.01."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Must"
    cid="379"
><![CDATA[<p>ITSMs MUST be responsible for assisting system owners to obtain and maintain the accreditation of their systems.</p>]]></paragraph>
<paragraph
    title="3.3.6.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="380"
><![CDATA[<p>ITSMs SHOULD identify systems that require security measures and assist in the selection of appropriate information security measures for such systems.</p>]]></paragraph>
<paragraph
    title="3.3.6.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="381"
><![CDATA[<p>ITSMs SHOULD consult with ICT project personnel to ensure that information security is included in the evaluation, selection, installation, configuration and operation of IT equipment and software.</p>]]></paragraph>
<paragraph
    title="3.3.6.C.04."

    tags="Governance,Risk Assessment"


    classification="All Classifications"
    compliance="Should"
    cid="382"
><![CDATA[<p>ITSMs SHOULD work with agency enterprise architecture teams to ensure that security risk assessments are incorporated into system architectures and to identify, evaluate and select information security solutions to meet the agency’s security objectives.</p>]]></paragraph>
<paragraph
    title="3.3.6.C.05."

    tags="Governance,Risk Management,Change Management"


    classification="All Classifications"
    compliance="Should"
    cid="384"
><![CDATA[<p>ITSMs SHOULD be included in the agency’s change management and change control processes to ensure that risks are properly identified and controls are properly applied to manage those risks.</p>]]></paragraph>
<paragraph
    title="3.3.6.C.06."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Should"
    cid="385"
><![CDATA[<p>ITSMs SHOULD notify the Accreditation Authority of any significant change that may affect the accreditation of that system.</p>]]></paragraph>
</block>
<block title="Responsibilities – Working with vendors"><paragraph
    title="3.3.7.R.01."

    tags="Governance"


><![CDATA[<p>The CISO will coordinate the use of external information security resources to the agency, whilst ITSMs will be responsible for establishing contracts and service-level agreements on behalf of the CISO.</p>]]></paragraph>
<paragraph
    title="3.3.7.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="388"
><![CDATA[<p>ITSMs SHOULD liaise with vendors and agency purchasing and legal areas to establish mutually acceptable information security contracts and service-level agreements.</p>]]></paragraph>
</block>
<block title="Responsibilities – Implementing security"><paragraph
    title="3.3.8.R.01."

    tags="Governance"


><![CDATA[<p>The CISO will set the strategic direction for information security within the agency, whereas ITSMs are responsible for managing the implementation of information security measures within the agency.</p>]]></paragraph>
<paragraph
    title="3.3.8.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="391"
><![CDATA[<p>ITSMs MUST be responsible for ensuring the development, maintenance, updating and implementation of Security Risk Management Plans (SRMPs), Systems Security Plans (SSP) and any Standard Operating Procedures (SOPs) for all agency systems.</p>]]></paragraph>
<paragraph
    title="3.3.8.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="392"
><![CDATA[<p>ITSMs SHOULD conduct security risk assessments on the implementation of new or updated IT equipment or software in the existing environment and develop treatment strategies if necessary.</p>]]></paragraph>
<paragraph
    title="3.3.8.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="393"
><![CDATA[<p>ITSMs SHOULD select and coordinate the implementation of controls to support and enforce information security policies.</p>]]></paragraph>
<paragraph
    title="3.3.8.C.04."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="394"
><![CDATA[<p>ITSMs SHOULD provide leadership and direction for the integration of information security strategies and architecture with agency business and ICT strategies and architecture.</p>]]></paragraph>
<paragraph
    title="3.3.8.C.05."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="395"
><![CDATA[<p>ITSMs SHOULD provide technical and managerial expertise for the administration of information security management tools.</p>]]></paragraph>
</block>
<block title="Responsibilities – Budgeting"><paragraph
    title="3.3.9.R.01."

    tags="Governance"


><![CDATA[<p>As ITSMs are responsible for the operational management of information security projects and functions within their agency, they will be aware of their funding requirements and can assist the CISO to develop information security budget projections and resource allocations.</p>]]></paragraph>
<paragraph
    title="3.3.9.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="398"
><![CDATA[<p>ITSMs SHOULD work with the CISO to develop information security budget projections and resource allocations based on short-term and long-term goals and objectives.</p>]]></paragraph>
</block>
<block title="Responsibilities – Reporting"><paragraph
    title="3.3.10.R.01."

    tags="Governance"


><![CDATA[<p>To ensure the CISO remains aware of all information security issues within their agency, and can brief their agency head when necessary, ITSMs will need to provide regular reports on policy developments, proposed system changes and enhancements, information security incidents and other areas of particular concern to the CISO.</p>]]></paragraph>
<paragraph
    title="3.3.10.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="401"
><![CDATA[<p>ITSMs SHOULD coordinate, measure and report on technical aspects of information security management.</p>]]></paragraph>
<paragraph
    title="3.3.10.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="402"
><![CDATA[<p>ITSMs SHOULD monitor and report on compliance with information security policies, as well as the enforcement of information security policies within the agency.</p>]]></paragraph>
<paragraph
    title="3.3.10.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="403"
><![CDATA[<p>ITSMs SHOULD provide regular reports on information security incidents and other areas of particular concern to the CISO.</p>]]></paragraph>
<paragraph
    title="3.3.10.C.04."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="404"
><![CDATA[<p>ITSMs SHOULD assess and report on threats, vulnerabilities, and residual security risks and recommend remedial actions.</p>]]></paragraph>
</block>
<block title="Responsibilities – Auditing"><paragraph
    title="3.3.11.R.01."

    tags="Governance"


><![CDATA[<p>As system owners may not understand the results of audits against their systems ITSMs will need to assist them in understanding and responding to reported audit failures. ITSM's should also refer to 5.8 Independent Assurance Reports.  </p>]]></paragraph>
<paragraph
    title="3.3.11.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="407"
><![CDATA[<p>ITSMs SHOULD assist system owners and security personnel in understanding and responding to audit failures reported by auditors.</p>]]></paragraph>
</block>
<block title="Responsibilities – Disaster recovery"><paragraph
    title="3.3.12.R.01."

    tags="Governance"


><![CDATA[<p>Whilst the CISO will coordinate the development of disaster recovery policies and standards within the agency, ITSMs will need to guide the selection of appropriate strategies to achieve the direction set by the CISO.</p>]]></paragraph>
<paragraph
    title="3.3.12.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="410"
><![CDATA[<p>ITSMs SHOULD assist and guide the disaster recovery planning team in the selection of recovery strategies and the development, testing and maintenance of disaster recovery plans.</p>]]></paragraph>
</block>
<block title="Responsibilities – Training"><paragraph
    title="3.3.13.R.01."

    tags="Governance"


><![CDATA[<p>The CISO will oversee the development and operation of information security awareness and training programs within the agency. ITSMs will arrange delivery of that training to personnel within the agency.</p>]]></paragraph>
<paragraph
    title="3.3.13.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="413"
><![CDATA[<p>ITSMs SHOULD provide or arrange for the provision of information security awareness and training for all agency personnel.</p>]]></paragraph>
<paragraph
    title="3.3.13.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="414"
><![CDATA[<p>ITSMs SHOULD develop technical information materials and workshops on information security trends, threats, good practices and control mechanisms as appropriate.</p>]]></paragraph>
</block>
<block title="Responsibilities – Providing security knowledge"><paragraph
    title="3.3.14.R.01."

    tags="Governance"


><![CDATA[<p>ITSMs will often have an extensive knowledge of information security topics and can provide advice for the information security steering committee, change management committee and other agency and inter-agency committees.</p>]]></paragraph>
<paragraph
    title="3.3.14.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="418"
><![CDATA[<p>ITSMs SHOULD maintain a current and up-to-date security knowledge base comprising of a technical reference library, security advisories and alerts, information on information security trends and practices, and relevant laws, regulations, standards and guidelines.</p>]]></paragraph>
<paragraph
    title="3.3.14.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="419"
><![CDATA[<p>ITSMs SHOULD provide expert guidance on security matters for ICT projects.</p>]]></paragraph>
<paragraph
    title="3.3.14.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="420"
><![CDATA[<p>ITSMs SHOULD provide technical advice for the information security steering committee, change management committee and other agency and inter-agency committees as required.</p>]]></paragraph>
</block>
<block title="Responsibilities"><paragraph
    title="3.3.15.R.01."

    tags="Governance"


><![CDATA[<p>ITSMs are generally considered the information security experts within an agency and as such their contribution to improving the information security of systems, providing input to agency ICT projects, assisting other security personnel within the agency, contributing to information security training and responding to information security incidents is a core aspect of their work.</p>]]></paragraph>
<paragraph
    title="3.3.15.R.02."

    tags="Governance"


><![CDATA[<p>An ITSM is likely to have the most up to date and accurate understanding of the threat environment relating to systems. As such, it is essential that this information is passed to system owners to ensure that it is considered during accreditation activities.</p>]]></paragraph>
<paragraph
    title="3.3.15.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="424"
><![CDATA[<p>The ITSM SHOULD keep the CISO and system owners informed with up-to-date information on current threats.</p>]]></paragraph>
</block>
</subsection>
</section>
