ISACA & ROSI
SdS AIEA Roma 15 dicembre 2010
ISACA & ROSI ?
• G 41
• CobiT & ROSI
– Risk Drivers / Value Drivers
– Capire cosa vuole il Business ?
– Gestire l’investimento
• Val IT
SdS AIEA Roma 15 dicembre 2010
Driving Value From Information Security:
A Governance Perspective
Determining the ROSI of information security projects helps in crystallizing the
intangible benefits and nonquantifiable considerations. This enables management to
weigh all the factors in the right perspective and to arrive at informed decisions,
rather than relying on instinct alone.
ISACA JOURNAL VOLUME 2, 2009
Costs/benefits of IT security projects largely depend on the human factor, cost and
revenue drivers, business objectives, security metrics, and organizational
characteristics, which can substantially influence end results. Refining ROSI estimates
through learning experience and by comparing estimated and realized ROSI will
improve this tool with each successive project, resulting in better calibration and
more accurate estimates. Thus, ROSI, with a balanced scorecard focus, will become a
tool of choice for the future, in the hands of decision makers.
SdS AIEA Roma 15 dicembre 2010
SdS AIEA Roma 15 dicembre 2010
IS Auditing Guideline: G41 Return on Security Investment(ROSI)
maggio 2010
1. BACKGROUND
2. ROSI
3. OBJECTIVES
3.1 Audit
4. CONSIDERATIONS
4.1 Audit
5. EFFECTIVE DATE
5.1 This guideline is effective for all information systems
audits beginning on or after 1 May 2010.
SdS AIEA Roma 15 dicembre 2010
1.1 Linkage to Standards
1.1.1 Standard S10 IT Governance states the IT audit
and assurance professional should review:
• and assess whether the IT function aligns with the
enterprise’s mission, vision, values, objectives and
strategies
• whether the IT function has a clear statement
about the performance expected by the business
(effectiveness and efficiency) and assess its
achievement
• and assess the effectiveness of IT resources and
performance management processes
SdS AIEA Roma 15 dicembre 2010
1.2 Linkage to COBIT
• 1.2.1 Selection of the most relevant material in
COBIT applicable to the scope of the particular audit
is based on the choice of specific COBIT IT processes
and consideration of COBIT’s control objectives and
associated management practices.
• ……..
• The process and control objectives to be selected
and adapted may vary depending on the specific
scope and terms of reference of the assignment.
SdS AIEA Roma 15 dicembre 2010
1.3 Purpose of the Guideline
• 1.3.1 Enterprises are increasingly finding it
challenging to make a case to invest in IT
security. ……
1.3.2 Enterprises cannot afford to ignore the
value propositions of security metrics to
effectively achieve appropriate ROSI. ….
1.3.3 IT audit and assurance professionals
must have a clear understanding of the value
proposition for ROSI. ….
SdS AIEA Roma 15 dicembre 2010
1.5 Risk Management
1.5.1 There should be collaborative periodic risk assessment developed
amongst those responsible for securing information assets and the
responsible senior management, with the business owner(s) managing the
information assets of the enterprise. …
1.5.2 There is an inherent risk that the subject matter may be highly
complicated coupled with security engineers/administrators who may not
adequately understand all of the risks to the enterprise and the necessary
mitigating control processes. …
1.5.3 There is inherent audit risk resulting from the auditor responsible for
performing an independent assessment not adequately understanding
and/or reviewing the necessary control processes commensurate with the
level of risk. … Thus, management should be alerted that audit will not
guarantee that the auditor will completely identify, test and conclude on the
adequacy of all controls. Accordingly, additional oversight and independent
assessment of the auditor’s evaluation may be warranted given the size,
complexity and significance of the enterprise’s information assets.
SdS AIEA Roma 15 dicembre 2010
4.1 Audit
4.1.1 There are various ROSI models and there is no one model
that fits all enterprises.
4.1.2 Enterprises must have a well-defined process of data
collection for security breaches and lapses.
4.1.3 Security investments are made after proper analyses of
security requirements, risk assessments, product
performance, vendor service level agreement and, most
importantly, alignment of the security plan to the overall
business objectives.
4.1.4 No security is complete without adequate insurance. The
enterprise should be adequately protected by
appropriate insurance
4.1.5 Security must be considered as a business protector and
enabler not as an inhibitor.
4.1.6 Trust is the highest form of security.
•
…
SdS AIEA Roma 15 dicembre 2010
CobiT & ROSI
SdS AIEA Roma 15 dicembre 2010
®
COBIT Defines Processes, Goals and Metrics
Relationship
Amongst
Process,
Goals and
Metrics
(DS5)
SdS AIEA Roma 15 dicembre 2010
€ 2009 ISACA All Rights reserved. 12
I ritorni in termini di Business :
Value Drivers & Risk Drivers
• 788 Risk Drivers
• 736 Value Drivers
• Associati a 980 Control practices
SdS AIEA Roma 15 dicembre 2010
Ritorni
Investimenti
SdS AIEA Roma 15 dicembre 2010
Impatti in termini di business
SdS AIEA Roma 15 dicembre 2010
CobiT - Extended Balanced Scorecards
Improve customer
orientation and
service
Offer competitive
products and
services
Establish service
continuity and
availability
Obtain reliable and useful
information for strategic
decision making
Achieve cost optimalisation
of service delivery
Operational excellence
Improve and maintain
business process
functionality
Manage
business
change
Improve and
maintain
operational and
staff productivity
Provide compliance
with external laws,
regulations and
contracts
Compliance with
internal policies
SdS AIEA Roma 15 dicembre 2010
Improve
corporate
governance and
transparancy
Create agility in
responding to changing
business requirements
(time to market)
Customer orientation
Lover process cost
Manage ITrelated business
risk
Provide a good
return on
investment of
IT-enabeled
business
investments
Financial contribution
Vision
and
Strategy
Future orientation
Manage product
and business
innovation
€ L’IT è adeguata ?
€ Dove
intervenire
?
Acquire
and
maintain skilled
and motivated
people
€ Cosa fare, come ?
16
…. in altre parole: da dove comincio ?
Dov’è
l’Agility
?
SdS AIEA Roma 15 dicembre 2010
Dov’è l’Agility ?
Proviamo a chiederlo al : COBIT
SdS AIEA Roma 15 dicembre 2010
!
Valutazione degli obiettivi di business – Fase1
SdS AIEA Roma 15 dicembre 2010
19
Valutazione degli obiettivi di business – Fase2
Assegnazione importanza ai Processi IT
SdS AIEA Roma 15 dicembre 2010
20
Importanza del dominio / processo
PO
PO 10 Gestire progetti
AI
AI 1 Identificare soluzioni automatizzate
DS
DS 1 Definire e gestire i livelli di servizio
DS 3 Gestire le prestazioni e la capacità produttiva
ME
ME 1 Monitorare e valutare le prestazioni dell’IT
Si vedono chiaramente complementarietà tra aspetti strutturali /
organizzativi ed aspetti operativi / strumentali
SdS AIEA Roma 15 dicembre 2010
Impatti in termini di business
• Si possono usare anche bottom-up :
– Come giustificare un progetto che automatizza
Configuration Management e Sw Distribution
SdS AIEA Roma 15 dicembre 2010
ROSI : due ulteriori considerazioni
• ROSI per partire . . . e poi ?
• Evoluzione del ruolo dell’IT
• Val IT™
SdS AIEA Roma 15 dicembre 2010
SdS AIEA Roma 15 dicembre 2010
The Business Case Process Maturity
SdS AIEA Roma 15 dicembre 2010
The Seven Principles of Val IT™
IT-enabled investments will:
1. Be managed as a portfolio of investments
2. Include the full scope of activities required to achieve business value
3. Be managed through their full economic life cycle
Value delivery practices will:
4. Recognise different categories of investments to be
evaluated and managed differently
5. Define and monitor key metrics and respond quickly
to any changes or deviations
6. Engage all stakeholders and assign appropriate accountability
for delivery of capabilities and realisation of business benefits
7. Be continually monitored, evaluated and improved
SdS AIEA Roma€15
dicembre
2009
ISACA 2010
All rights reserved.
26
A New Perspective
IT Investments
Investments in
IT-enabled Change
27
SdS AIEA Roma 15 dicembre 2010
Source: The Information Paradox
Scarica

ISACA & ROSI