An Introduction to COBIT 4.1 The Control and Management Framework By: Aqel M. Aqel, CISA, MBA ISACA Riyadh Chapter – Saudi Arabia 08th of June 2009 ﺑﺴﻢ ﺍﷲ ﺍﻟﺮﺣﻤﻦ ﺍﻟﺮﺣﻴﻢ ﺃﻗﺮﺃ ﺑﺎﺳﻢ ﺭﺑﻚ ﺍﻟﺬﻱ ﺧﻠﻖ ﺍﻗﺮﺃ ﻭ ﺭﺑﻚ ﺍﻷﻛﺮﻡ 3 1 ﺧﻠﻖ ﺍﻹﻧﺴﺎﻥ ﻣﻦ ﻋﻠﻖ ﺍﻟﺬﻱ ﻋﻠﻢ ﺑﺎﻟﻘﻠﻢ ﻋﻠﻢ ﺍﻹﻧﺴﺎﻥ ﻣﺎ ﻟﻢ ﻳﻌﻠﻢ ﺻﺪﻕ ﺍﷲ ﺍﻟﻌﻈﻴﻢ 5 4 2 Seminar Outline ► ► Introduction about IT Governance Information Technology evolutions Roles between technical staff and other departments IT Risks ► ► The Need for IT Governance Governance, Different Models Evolutions Evolutions. COBIT Framework Domains & Criteria. IT Planning and Organizing. IT Acquisition and Implementation. IT Delivery and Support. IT Monitoring. g A Glance at Implementation Road Map 1. Introduction about IT Governance Introduction/ IT Governance Concepts What is the Role of IT in organization ? IT Impact on business: • Increasing / Total dependency on IT • Value of IT investments tangible & intangible • Higher cost of downtime • Customer trust / firm reputation • E-Commerce B B2 2B, B2 B2C …etc. opportunities • Information creditability • ICT can controll business b i process • Data capturing / performance Measurement Introduction/ IT Governance Concepts Corporate Governance : Business Business Business Business Business Business Business Business Business Business Business Business People Business Business Business A Business Assets t Owners & Business Business Business Business Tangible & workers Business Business Business Business Intangible B i e Business Business B i e Business B i e Business B i e Business Business Business Business Business Business Business Business Regulations Business Business Business Business L Local lBusiness & Business Business Business Business Process Global Business Business Business Business Business Business Business Business Business Business Business Business OUTCOMES • Realize Strategy • Achieve Business Objectives • Business Progress • Customer Satisfaction • National Prosperity p y Introduction/ IT Governance Concepts ICT as Business Enabler Stakeholders Business Activities Reports IT Governance Information Framework Business Logic & Controls IT Infrastructure Hard are Hardware S ft Software H Human R Resources IT Process Source: Aqel M. Aqel Introduction/ IT Governance Concepts Conventional Governance Tools: ► Organization g Structure ► Roles and responsibilities ► Policies & standards ► Controls Preventive Detective corrective ► Periodic Reporting ► Reviewing ► I d Independent d Audit A di Source: Aqel M. Aqel Introduction/ IT Governance Concepts 1. Supports b S business i effectively ff i l to Maximize Profits & optimize costs 2. Business Competitive advantage d 3. New business opportunities 4. Protect IT investment 5. Successful IT Projects 6. Manage IT risks 7. B i Business continuity i i Profitts $ Controlled (Governed) IT will: Ti Time 2. IT Risks IT Risks It is Serious. Sam mple Threats Trojan Horses Rounding g Down Viruses Worms Logic Bomb Trap Doors Wire Tapping Data Leakage Network Attacks (DOS) Abnormal Shutdown Natural Disasters Source: 2002 CERT Source: 2002 CSI/FBI Survey Cost of Downtime Source: Meta Group 2000 Internet and ee-Mail Threats ¾ 77 % of Web sites with malicious code are legitimate sites that have been compromised compromised.. ¾ 70 % of the top 100 sites either hosted malicious content or contained a masked redirect to lure unsuspecting victims from legitimate sites to malicious sites. sites. ¾ 84..5 % of email messages were spam. 84 spam. ¾ 90..4 % of all unwanted emails in circulation during this period 90 contained links to spam sites or malicious Web sites. sites. ¾ 39 % of malicious Web attacks included datadata-stealing code. code. ¾ 57 % of datadata-stealing attacks are conducted over the Web Web.. Source: recent research by Websense Security Labs™ 2009 IT Risks..wellRisks..well-known Incidents Estonia Pictured: Russians protest Tallinn Tallinn's s decision to move a Soviet memorial. When Estonia's government announced it was relocating a Soviet memorial in the country's capital, Russian hackers expressed their displeasure with cyberwarfare. They launched a wave of "distributed denial-of-service" attacks against the country's government, banking and media Web sites, using thousands of personal computers hijacked with hidden software to overload the servers. Many sites were down for more than a week. Estonia originally blamed Russia's government for the cyber blitz, but no direct connection between the hackers and the country's government could be found. Source: Worst Cyber security Meltdowns, by Andy Greenberg, Oct 2007 Forbs.com IT Risks..wellRisks..well-known Incidents TJX (Retailer)- Jan 2007 © eva serrabassa/IstockPhoto In January, retailer TJX, owner of TJ Maxx and Marshall's, Marshall's revealed that hackers had gained access to more than 45 million users' credit card information--the largest single data theft of all time. According to an investigation by Canada's Privacy Commission, the hackers likely used a long-range antenna to tap the stores' wi-fi networks Weaving within outmoded networks. wireless protocol, the electronic intruders spent more than a year and a half stealing reams of private financial data. By TJX TJX'ss own accounting accounting, the theft has cost more than $256 million. Source: Worst Cyber security Meltdowns, by Andy Greenberg, Oct 2007 Forbs.com IT Risks It is Serious. When an organization suffers a data breach, it costs approximately US $197 per lost record. record That means if a company loses 100,000 records, it would cost close to US $20 million. Source: COBIT Focus Vol. 3 2008 IT Failure Statistic What’ are the Risks? 26% Power Outage Service Failure Burst Water Pipe 1% Human Error 2% Network Outage 2% Other 2% Power Surge / Spike 12% Storm Damage 1% 10% 3% Flood 8% Hardware Error 3% 5% Employee Sabotage Software Error Earthquake 7% Bombing 6% 6% Fire 6% H i Hurricane Source: Contingency Planning Research IT Risks Who is responsible ? Business owners / Managers are responsible for Sustaining business operations and any losses incurred because of ICT Threats. Managers Hot Issues and Key Concerns 1/4 ► ► ► ► ► How far should we go in controlling IT, and is the cost justified by the benefit? What are the indicators of good performance? What are the key management practices to apply? What do others do? How do we measure and compare? Managers Hot Issues and Key Concerns 2/4 ► ► ► ► ► ► ► Poor understanding of the value contribution of IT Risks not recognized g Lack of management direction or effective oversight committees Poor time time--toto-market results relative to software development Projects running over budget Frequent security incidents and A li ti Applications lacking l ki in i functionality. f ti lit Managers Hot Issues and Key Concerns 3/4 Source: ITGI IT Governance Global Status Report 2006 Managers Hot Issues and Key Concerns 4/4 Source: Gartner Research What IT Governance is all about? ► how does the enterprise get IT under control such that: It delivers the information the enterprise needs? How does it manage the risks and secure the IT resources on which it is so dependent? How does the enterprise ensure that IT achieves its objectives and supports the business? ► Management needs control objectives that contains: Policies,, Practices, Procedures & Organizational Structure Designed to Business objectives are achieved provide Undesired events are: reasonable Prevented or assurance that: th t Detected and Corrected Drivers for IT Governance implementation ► ► ► ► ► ► ► ► ► ► ► Dissatisfied customers Changing market position Competition New product/service introduction High operating costs or other fiscal issues Inefficient or ineffective business processes Security or privacy breach Major business operational or IT outage Obsolescence of IT or information systems y Merger or acquisition Shareholder demand for shortshort-term results ► ► ► ► ► ► ► ► ► ► ► ► ► ► Regulatory or legislative changes New chief executive officer (CEO) Privatization/regulation Enterprise resource planning Outsourcing Best--of Best of--breed IT systems Common IT architecture Shared services C t reduction Cost d ti Quality of IT service provision Technology innovation IT enablers bl to t assist i t enterprise t i business b i goals Transaction growth Realignment with available IT skills Governance Environment Vary according ► ► ► ► ► ► ► The community’s and enterprise’s ethics and culture Ruling g laws,, regulations g and policies, p , (internal ( and external)) The mission, vision and values of the enterprise The enterprise’s models for roles and responsibilities The enterprise’s governance policies and practices Industry practices Th enterprise’s The t i ’ business b i plan l and d strategic t t i intentions i t ti 3. COBIT Framework Domains & Criteria. Criteria Introduction/ COBIT 4.1 2007 COBIT ™ Control Objectives for IT & Related Technologies ► Contains 34 Business Driven IT processes categorized into four groups. ► Associated with each process a set of detailed control objectives based on international best practices (318 (318 C.O. in third edition, 215 in ver. 4.0 reduced to 210 in 4.1). ► Controls specifies the purpose (objective) to be achieved out of the h control, l with i h a set off KGI, G KSF, S & audit di guidelines. id li ► It includes management guidelines and maturity levels of five grades for each control control. IT Governance Definition: “A structure t t off relationships l ti hi and d processes to t direct di t and d control t l the enterprise in order to achieve the enterprise’s goals by adding value while balancing risk versus return over IT and its processes.” Source www.austin.cc.tx.us/audit/Glossary/LetterI.htm ITGI definition: It is an integral part of enterprise Governance and consists of leadership, organizational structure and processes that h ensures the h organization i i ’s IT S Sustains i & extends d the organization strategies and objectives.” Source: COBIT 3 Enterprise / Corporate Governance: ITGI definition: “It is a set of responsibilities and practices exercised by the BOD and d executive ti managementt with ith the th goall off providing idi strategic t t i direction, ensuring that the risks are managed appropriately and verifying that the enterprise resources are used responsibly.” Source: ITGI “The system by which the current and future use of ICT is directed and controlled. It involves evaluating and directing the plans for the use of ICT to support the organization and monitoring this use to achieve plans. It includes the strategy and policies for using ICT within an organization. source AS 8015 8015--2005 COBIT Governance Concepts What we want from Information Technology? 1. 2. 3. Information Quality Requirements: • Correctness • Completeness • Accuracy Fiduciary Requirements: Criteria 1. Effectiveness 2. Efficiency • Availability • Reliability • Compliancy 4. Integrity • Effectiveness 5 Availability 5. Security Requirements: 3. Confidentiality • Confidentiality 6. Compliance • Integrity 7. Reliability • Availability COBIT Governance Concepts IT Assets / Resources Categories Simply, IT Governance is about Control & P t ti … Protection, 1. Applications 2. Information So What we want to govern / protect? 3. Infrastructures (Technology & Facilities in COBIT III) 4. People (Human resources COBIT III) IT Governance Domains: 1. Planning and organizing 2 2. Acquisition and Implementation 3 3. Delivery and support 4. Monitoring & Evaluation Source: COBIT 4 Control Objecti es Objectives for IT & Related Technologies, T h l i COBIT™ . COBIT™ 1. Plan and Organize 2. Acquire Implement 3. Deliver and Support 4. Monitor and Evaluate P01 – P10 AI1 AI 1 – AI AI7 7 DS1 DS 1 – DS DS13 13 ME1 ME 1 – ME ME4 4 Introduction/ Governance concepts COBIT ™ , what we mean by “Control” ? Control: The policies, procedures, practices and organizational structures designed to provide reasonable assurance that business objectives will be achieved and undesired events will be prevented or detected and prevented. Control Objectives: The statement of the desired result or purpose to be achieved by implementing control procedures in a particular IT activity Source: COBIT Introduction/ Governance concepts COBIT ™ Control C l Obj Objectives i for f IT & R Related l d Technologies The Control of IT Process To satisfy Business Requirements By Focusing on Control Statements Considering Source: COBIT Control Practices Plan and Organize ► ► ► ► ► ► ► ► ► ► PO1 Define a Strategic IT Plan PO1 PO2 PO 2 Define the Information Architecture PO3 PO 3 Determine Technological Direction PO4 PO 4 Define the IT Processes, Organization and Relationships PO5 PO 5 Manage the IT Investment PO6 PO 6 Communicate Management Aims and Direction PO7 PO 7 Manage M IT Human H Resources R PO8 PO 8 Manage Quality PO9 PO 9 Assess and Manage IT Risks PO10 PO 10 Manage Projects Acquire and Implement ► ► ► ► ► ► ► AI1 AI1 AI2 AI 2 AI3 AI 3 AI4 AI 4 AI5 AI 5 AI6 AI 6 AI7 AI 7 Identify Automated Solutions Acquire q and Maintain Application pp Software Acquire and Maintain Technology Infrastructure Enable Operation and Use Procure IT Resources Manage Changes I t ll and Install d Accredit A dit Solutions S l ti and d Changes Ch Deliver and Support ► ► ► ► ► ► ► ► ► ► ► ► ► DS1 Define and Manage Service Levels DS1 DS2 DS 2 Manage ThirdThird-party Services DS3 DS 3 Manage M Performance P f and d Capacity C it DS4 DS 4 Ensure Continuous Service DS5 DS 5 Ensure Systems Security DS6 DS 6 Identify and Allocate Costs DS7 DS 7 Educate and Train Users DS8 DS 8 Manage Service Desk and Incidents DS9 DS 9 Manage the Configuration DS10 DS 10 Manage Problems DS11 DS 11 Manage Data DS12 DS 12 Manage M the h Physical Ph i l Environment E i DS13 DS 13 Manage Operations Monitor and Evaluate ► ► ► ► ME1 ME1 ME2 ME 2 ME3 ME 3 ME4 ME 4 Monitor and Evaluate IT Performance Monitor and Evaluate Internal Control Ensure Regulatory Compliance Provide IT Governance Control over the IT process of: PO1 PO 1 Define a Strategic g Information Technology gy Plan that satisfies the business requirement Sustain or extends business strategy and governance requirements By Focusing on Translate business requirements into services And achieved by 9 9 9 Alignment of business current and future plans. plans Understand current capabilities Prioritization of business objectives PO1 PO 1 Define a Strategic Information Technology Plan Detailed Control Objectives 1.1 IT value management 1.2 Business – IT Alignment 1.3 Assessment of current Performance 1.4 IT Strategic Plan 1.5 IT Tactical Plans 1.6 IT Portfolio management Control over the IT process of: PO2 PO 2 Define the Information Architecture that satisfies the business requirement Respond to requirements, provide reliable and consistent information, integrate application to business processes. processes By Focusing on To be agile in responding to requirements, to provide reliable and consistent information and to seamlessly integrate applications into business processes And achieved by Assuring the accuracy of the information architecture and data model 9 Assigning data ownership 9 Classifying information using an agreed classification scheme 9 PO2 PO 2 Define the Information Architecture Detailed Control Objectives 2.1 Enterprise Information Architecture Model 2.2 Enterprise Data Dictionary and Data Syntax Rules 2.3 Data Classification Scheme 2.4 Integrity Management Control over the IT process of: AI1 AI 1 Identify Automated Solutions that satisfies the business requirement Translating business functional and control requirements into an effective and efficient design of automated solutions By Focusing on Identifying technically feasible and costcost-effective solutions And achieved by Defining business and technical requirements 9 Undertaking feasibility studies as defined in the development standards 9 Approving (or rejecting) requirements and feasibility study results 9 AI1 AI 1 Identify Automated Solutions Detailed Control Objectives 1.1 Definition and Maintenance of Business Functional and Technical Requirements 1.2 Risk Analysis Report 1.3 Feasibility Study and Formulation of Alternative Courses of Action 1.4 Requirements and Feasibility Decision and Approval What Else…? Else ? Business Goals vs. IT Goals 17 Business Goals 28 IT Goals Products Components 1. 2. 3. 4. 5 5. 6. COBIT Framework IT Assurance Guide Using COBIT COBIT Control Practices: Guidance to Achieve Control Objectives for Successful IT Governance, 2nd Edition, COBIT Quick start COBIT Security Baseline Board Briefing on IT Governance, 2nd Edition 4. Implementation !!! IT Governance Life Cycle Governance Objective Direct Create Protect Execute Monitor IT Governance Focus Area Strategic St t i Alignment Value Delivery Risk Ri k Management Resources R Management Performance P f Management COBIT / VAL IT • Business – IT Goals • Control Objectives •O Outcomes t indicators • Management Practices and performance metrics Contribution • Process and Maturity Models • ICT Balanced Scorecard •A Assurance Guide Source: COBIT Implementation Guide 2nd edition 2007 Stakeholders' Objectives That derived Implementation phases COBIT Implementation Road Map Source: COBIT Implementation Guide 2nd edition 2007 Thank You Introduction to IT Governance Using COBIT IV Framework