Kamlesh Bajaj, CEO, DSCI

advertisement
Security and Quality
Kamlesh Bajaj
CEO, DSCI
May 23, 2009
NASSCOM Quality Summit
Hyderabad
A NASSCOM® Initiative
1
IT Services Management
IT Operations
Shifting from a technology-led siloed structure into a process-centric serviceoriented organization
Organizing Framework
To link technology components in infrastructure to the process steps that exist
within IT
Guiding Framework
Link IT Processes to business activities and create service-level metrics
IT Management frameworks
Improve the management of IT
ISO; CMMI; ITIL
Allow for the systematic and least disruptive path to adoption
Generic FWs; must be tailored to
the specific needs of a company
Support IT Governance imperatives
1. ISO 20000
1. Focus on certification
2. CMM
2. Describes process maturity
3. CMMI
3. Emphasizes process improvements
4. ITIL
4. Defines & leverages best practices for management and operations of IT org
IT Management Frameworks
organized into 5 logical subject
areas
1. Project Management (PMBOK, PRINCE2...)
Integrate new technologies and architectures into a service-oriented operation
2. Software development (TickIT, Agile, MSF, IT CMM...)
3. Process management (Software CMM, CobIT, ISO 15504, Six Sigma, TOGAF..)
4. Service management (ISO 20000, ISO/IEC 38500, ITIL, MOF, eTOM...)
5. Security management (ISO 27001...)
6. Strategy (Balanced Scorecard...)
A NASSCOM® Initiative
2
IT Frameworks benefit both business and IT
Six Sigma and ITIL
1.
2.
3.
4.
Facilitate Business and IT alignment through quality
Helps deliver high-quality IT services at min cost to business
Provide both process and performance improvements
Six Sigma focus on process; ITIL on best practices for
delivery and support of IT services
CMM and ITIL
1. Help streamline infrastructure and development processes
2. ITIL focus on service management (Operations); CMM focus
on maturity of the organization that develops and maintains
software
3. Interdependencies through three key processes: change
management, configuration management, and release
management
CoBIT and ITIL
1. To measure ITIL in which ‘how’ of detailed tasks and steps
absent
2. CobIT defines 34 processes; its performance measures define
key performance indicators that ITIL processes must deliver
against
A NASSCOM® Initiative
3
Security and QA in SOX Compliance
SOX Compliance
1. Controls and monitoring practices required not new to QA
2. Companies with strong QA groups ahead in SOX
compliance
QA’s independence 1. From applications development and the checks and
balances performed by QA groups ensure adherence to
best practices.
2. Implementing formal QA to standardize and document
current processes for improvement and leveraging those
practices for continued SOX compliance
Restructuring of
organizations
1. IT shops making testers part of centralized testing teams;
not of development teams
2. Moving testing out of development and into operations.
3. Similar to Security Organization and IT Operations
independence
4. Many IT functions, including quality assurance, security,
architecture, and compliance, need some level of
independence to avoid conflicts of interest.
A NASSCOM® Initiative
4
QA and Security groups: synergize for Compliance
QA important for
compliance
1. Adds value through formal process
2. Audit not a one-time exercise, process helps culture change
3. Continual verification, validation, and audit processes via QA assist
in changing culture while improving overall delivery practices
4. Nature of QA is to develop, review, and document: test plans or
SDLC practices, the essence of QA is in the auditability of processes
5. Leveraging QA practices provides assistance in ensuring IT
compliance
Section 404 of SOX or in
COBIT requires that
internal controls be in
place ; but does not
specify
1. QA's primary role is to validate processes and document findings in
SDLC
QA Role expansion
App Dev and delivery processes expanded to include compliance-related
issues, such as risk, change control, and release management.
2. Employing similar QA practices to validate compliance with SOX can
gain additional value.
3. Using existing QA processes brings visibility to detect potential risks of
noncompliance, as well as planning strategies for correction and
validation.
A NASSCOM® Initiative
5
Triumph of Quality Management Frameworks
A NASSCOM® Initiative
6
Framework for a Systematic, Comprehensive Approach to Information Security
7
®
A NASSCOM Initiative
DSCI- Data Protection Practices
Security Market
Research
Legal
Forums
Privacy Regulations
Academic
Collaborations
Data Protection
Authorities
Knowledge Collaboration
Security Technology Trends
EU Privacy Directives
DSCI- Best Practices
Data Security
Data Privacy
Canada- PIPEDA
Aus- Privacy Act 1988, APAC
IT (Amendment) Act, 2008
Compliance Regulations
Technology Forums
• Mapping to compliance
regulations
• Adoption of leading practices
• Micro level & customized
• Easy of implementation
GLBA
HIPAA
Technology and
Vendor interactions
US- FTC directives, Patriot Act
Legal & Regulatory
Requirements
UK- Data Protection Act 1998
Architecture Principles
Solution Categories
Product, solution trends
Technology advancement
Security Vendor Collaboration
Vendor forums, interactions
Industry best practices
PCI-DSS
Security Management
ISO 27001
Risk Management
OCTAVE | COSO | FMEA
Security Standards
ITU-T X.1051
Security Practices
NIST SP 800
8
®
A NASSCOM Initiative
IT Governance
CoBIT
Infrastructure Mgmt
ITIL | ISO 20000
Best Practices: Data Security and Privacy
Privilege Account Management
Access to personal information
164.310(d)(2)(iv) Data backup & storage
164.310(d)(2)(i)
Disposal
164.3122(a)(2)(i)
User identification
Back-Up
Media Handling
Controls against Mobile code
Physical Sec Eqp Security
Reporting security events
Access Cntrl
Access
User Mgmt
Mapping of
Compliance
Regulations
OECD Principles
Control
Identification
Best Practice
Framework
Security Privacy
ISO 27001
Best Practices
Industry Standards
Global Best Practices
Privacy Principles
Technology Trends
9
®
A NASSCOM Initiative
Thank You
A NASSCOM® Initiative
10
Download