1 - ICT.govt.nz

advertisement
Department of Public Service Delivery (DPSD)
ICT Operations Assurance Plan
2015
Version 0.9
31 May 2015
IMPORTANT: This document provides an illustrative example of a populated ICT operations
assurance plan and does not reflect the actual risks or controls of a particular agency.
Agencies using this template must determine what assurance activities are required based on
their own assessment. Sample text in this document should not be used in actual assurance
plans unless it reflects the true position of the agency. All names of individuals in this
document are fictional.
Document Approval
Name / Title
Recommended by Chief Information
Officer
Recommended by Head of Agency
Risk / Assurance
Approved by Chief Executive
Received and filed by GCIO ICT
Assurance
Sign-off Date
DOCUMENT CONTROL
Document History
Version
Issue Date
Author
Description of Changes
0.1
31/1/15
Jim Riskowner
Initial draft
0.2
15/2/15
Jim Riskowner
Inserted risks and ratings
0.3
18/2/15
Jim Riskowner
Populated schedule
0.4
20/2/15
Jim Riskowner
Updated schedule
0.5
3/3/15
Jim Riskowner
Updated schedule
0.6
3/4/15
Robert Chackitout
Updated schedule
0.7
1/5/15
Paul Schmidt
Updated schedule
0.8
15/5/15
Maria Veracruz
Inserted references to attachments
0.9
31/5/15
Jim Riskowner
Draft to GCIO
Key Contacts
Name
Title
Contact Details
Robert Chackitout
Chief Information Officer
04 000 0000
Jen Locktight
Chief information Security
Officer
022 000 000
Jude Gardner
Head of Risk / Assurance
022 000 001
Jim Riskowner
Principal IT Risk Advisor
04 000 0000, 027 000 0000
FY 2016 Assurance Plan – Version 0.9 (Web SAMPLE)
31 May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 2 of 24
Table of Contents
1.
CONTEXT ......................................................................................................... 4
1.1 Key Objectives and Outcomes ....................................................................... 4
1.2 Scope and Approach....................................................................................... 4
1.3 Key Risks ......................................................................................................... 5
1.4 Roles, Accountability and Responsibilities – Overall Plan .......................... 6
1.5 Monitoring and Reporting Process ................................................................ 7
1.6 Referenced Documents .................................................................................. 8
2.
ASSURANCE SCHEDULE OVERVIEW ........................................................... 9
2.1 Assurance Approach ...................................................................................... 9
2.2 Lessons Learned............................................................................................. 9
2.3 Decisions / Assumptions .............................................................................. 10
2.4 Roles, Accountability and Responsibilities – Individual Activities ............ 10
2.5 Assurance Budget ......................................................................................... 11
2.6 Assurance Schedule ...................................................................................... 11
3.
DETAILED ASSURANCE SCHEDULE ........................................................... 12
FY 2016 Assurance Plan – Version 0.9 (Web SAMPLE)
31 May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 3 of 24
CONTEXT
1.
1.1
Key Objectives and Outcomes
The objective of this document is to outline how over the course of FY16 our agency will obtain
confidence that ICT operations will support and enable our agency’s key business objectives.
In order to carry out its mandate of managing key risks and system-wide risks, the Government
Chief Information Officer (GCIO) has required that all departments and agencies submit ICT
operations assurance plans covering significant risk areas by 30 June 2015.
ICT risks are business risks
In fulfilling our mandate to deliver services to the public, we depend on the effective, secure and
reliable operation of our ICT systems. In addition, opportunities frequently arise to leverage
technology to improve our business outcomes. We must be able to both maintain the operation of
our existing ICT systems, and be in a position where our agency’s leaders can confidently take
advantage of technology-enabled opportunities.
Our business, operational, and support functions face a number of risks due to their reliance on ICT
to both support and enable their objectives. Some risks have negative consequences, and some
are clear opportunities. Good management of risks, embedded in all business decisions, helps
ensure we are efficient, effective, and focussed on the outcomes that matter most to those we
serve.
Following our organisation’s risk management framework and methodology, we continually assess
our ICT operations risks and apply mitigations to bring risk within an acceptable tolerance.
This ICT Operations Assurance Plan outlines the assurance activities planned for FY15/16 to
provide objective evidence that controls and other mitigations are working. These activities may
include, for example: analysis of information obtained through monitoring, routine or special reviews
by management or governance bodies, and audits / reviews by internal or external parties.
In the area of ICT security, our agency has been responding to surveys by the GCIO which have
sought information on our governance, policy, and controls for securing publicly accessible systems.
In our responses to these surveys we have committed to achieving a “3” on the survey’s maturity
scale by March 2015. A “3” indicates:

A structured IT security assurance programme is in place. The programme is approved and
regularly reviewed by an independent governance group.
This plan, with its strong focus on ICT security, will fulfil our commitment to having a structured
programme of assurance in place.
1.2
Scope and Approach
This assurance plan is part of the agency’s overall risk management and assurance approach, and
specifically covers ICT operations risk areas: i.e. business-as-usual (non-project) risks related to the
technology with which we manage and transmit our information.
The GCIO has informed us of the top 5 system risk areas self-identified by agencies in its ICT
Operations Risk Survey, which took place in March 2014. These are:

Information Security Management (including the security aspects of Privacy)
FY 2016 Assurance Plan – Version 0.9 (Web SAMPLE)
31 May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 4 of 24




Service Continuity Management
Service Portfolio Management
Capacity Management
Supplier Management.
Our Senior Leadership Team has confirmed that these top 5 risk areas are indeed the significant
risk areas for our organisation. We have over 30 critical operational systems, including 15 publicfacing systems, and our reputation and ability to deliver services depends on these systems being
secure and available. In addition, we can increase our effectiveness and return on investment by
strategically managing our service portfolio and the capacity of our systems and people. Finally,
with more of our systems and support being outsourced, including to the ‘cloud’, we need to have
confidence in our own ability to confirm that our suppliers meet expectations, and to obtain
assurance from them.
Our assurance planning process will continue to evolve over at least the next three years. As we
proceed along the journey toward risk management and assurance maturity, we will bring other
areas of ICT operations into our formal annual plans. While this year we have prioritised and are
including the highest risk areas in the formal plan, there are many other assurance activities
occurring regularly across other ICT operational areas.
As described in Section 2.1, in collaboration with stakeholders, we have arrived at this plan by:




Identifying our specific risks within each of the top 5 risk areas
Determining what assurance activities were already planned
Identifying where there were assurance gaps
Deciding which assurance activities would be most valuable to add or revise over the coming
year.
We then created a schedule of assurance activities for FY15/16 that is achievable and, most
importantly, will be of value to decision makers.
1.3
Key Risks
As a result of the process described in Section 1.2, at a high level, and within the “top 5” risk areas,
we identified the following key risks:
Key Risks
Current Risk Rating
1. Information may be accessed / accessible by unauthorised person.
High
2. Our ICT services could be providing greater value.
High
3. Capability / capacity to provide IT services may be lost following a disaster
/ outage.
4. Suppliers may not be protecting our information (including DR).
High
5. Suppliers may not perform and/or opportunities to increase value may be
missed.
High
6. We may not have enough staff with the right skills to meet our objectives
related to ICT.
Moderate
7. Staff may be using unlicensed software and this may result in a legal
penalty or security breach.
Moderate
FY 2016 Assurance Plan – Version 0.9 (Web SAMPLE)
High
31 May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 5 of 24
8. Current suppliers may not be able to continue to meet business needs into
the future.
Moderate
9. ICT systems may not provide sufficient storage and performance.
Moderate
1.4
Roles, Accountability and Responsibilities – Overall Plan
The table below outlines the key roles and responsibilities in developing and managing this plan.
1. Accountability
Overall accountability for the assurance plan.
Acceptance of the residual business risk.
Chief Executive
Helen Beck
2. Responsibility
2i. Preparation
Preparation /sign-off of the assurance plan
(annually).
Chief Information Officer
Recommendation of the assurance plan to the Chief
Executive.
Chief Information Officer
Robert Chackitout
Robert Chackitout
Head of Risk / Assurance
Jude Gardener
2ii. Monitoring
Ongoing monitoring of progress against this plan,
and the consolidated results of the assurance
activities.
Chief Information Officer
Robert Chackitout
Ongoing monitoring of progress against this plan,
and the consolidated results of the assurance
activities.
Updating the plan mid-cycle in response to changing
priorities.
Chief Information Officer, in consultation with
Head of Risk / Assurance
Jude Gardener
Tracking of action items (such as control
improvement initiatives and remediations).
Chief Information Officer to be provided status
updates monthly by assigned action owners.
Robert Chackitout
2iii. Reporting
Approval of monthly assurance summary report (see
Section 1.5)
Chief Information Officer
Preparation and distribution of monthly assurance
summary report (see Section 1.5)
Reporting of assurance results to the Risk and Audit
Committee.
Principal IT Risk Advisor
Robert Chackitout
Head of Risk / Assurance
Jude Gardener
Head of Risk / Assurance
Jude Gardener
2iv. Quality
Quality of plan and monthly assurance reporting.
Chief Information Officer
Robert Chackitout
FY 2016 Assurance Plan – Version 0.9 (Web SAMPLE)
31 May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 6 of 24
3. Contributing
Contributing to the plan, confirming the scope /
timing of assurance activities they sponsor.
1.5
Chief Information Officer
Robert Chackitout
Chief Information Security Officer
Jen Locktight
Privacy Officer
Tina Flavell
Chief Operating Officer
Simon Weyland
Head of Risk / Assurance
Jude Gardener
Manager, Internal Audit
Cynthia Cho
Monitoring and Reporting Process
The results of each assurance activity will be reported to stakeholders as detailed in the terms of
reference, standard operating procedure, or other document that defines each activity. A list of
those to receive the results must be agreed for each activity.
In addition, assurance providers must send the results of completed assurance activities to the CIO
and Principal ICT Risk Advisor as soon as the results are finalised, or sooner if the results indicate a
serious issue or urgent opportunity. On a monthly basis, the Principal ICT Risk Advisor (in the
Office of the CIO) will compile these results into a Monthly ICT Operations Assurance Summary
for the CIO.
The Monthly ICT Operations Assurance Summary will include at a minimum:






Progress against the plan (are the assurance activities on schedule? on budget?)
Key results from the previous month (summary)
Indication of increasing or decreasing confidence in controls over each key risk from Section
1.3 (key risk dashboard)
Any new risks identified (with a summary of how these were escalated / recorded)
Any new adjustments needed to assurance or controls (with action plans)
Challenges and successes.
The CIO and Head of Risk / Assurance will review and approve the Monthly ICT Operations
Assurance Summary, directing where necessary on any new risks or adjustments to the plan.
Copies will then be made available to the Senior Leadership Team and the Chief Executive.
The Head of Risk / Assurance will report quarterly to the Risk and Audit Committee on the progress
of the ICT Operations Assurance plan, and escalate to the Risk and Audit Committee any critical
risks. Protocols for this reporting have been added to the Internal Audit and Risk charters, and
supporting procedures documents.
Notwithstanding the above process, any significant new risks or assurance information must be
escalated immediately to the appropriate level. In some cases it will be appropriate to communicate
assurance results and/or key risks (including opportunities) to the GCIO to support its system-wide
view; the scope of this reporting will be agreed with the GCIO.
The results of the assurance activities, and lessons learned from the process, will be used to inform
the development of the FY16/17 Annual ICT Operations Assurance Plan, which will be developed
beginning in February 2016 and completed by 30 June 2016.
FY 2016 Assurance Plan – Version 0.9 (Web SAMPLE)
31 May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 7 of 24
1.6
Referenced Documents
Appendix 1 – Final Risk and Mitigation Register, May 2015
Appendix 2 – Risk Appetite statement, January 2015
FY 2016 Assurance Plan – Version 0.9 (Web SAMPLE)
31 May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 8 of 24
2.
2.1
ASSURANCE SCHEDULE OVERVIEW
Assurance Approach
To develop the assurance schedule for FY15/16, we first sought to understand the relevant risks
within each of the top 5 areas. We liaised with Risk, Internal Audit, managers, the Senior
Leadership Team and other stakeholders to collect information on risks and controls they had
already identified. For new risks or risks that were not yet rated, we worked with stakeholders to
evaluate the risks, with due consideration of the “risk appetite” of our agency, and identified controls.
Next, we sought to determine what activities were already planned or underway to give us
assurance the controls are managing the risks. Through this process, we identified some areas
where we felt there was not enough assurance in place, and other areas where different assurance
providers would be duplicating assurance effort.
Where there were gaps, we worked with assurance providers to identify new activities to give us the
assurance we need. We also identified actions for further improving controls. Throughout the
process, we consulted key internal and external stakeholders to understand their assurance
expectations.
We then created a schedule of assurance activities for FY15/16 that is achievable and, most
importantly, that will be of value to decision makers.
2.2
Lessons Learned
As this is our first annual plan, we are not carrying over lessons learned from a previous year.
However, our Chief Information Officer and Head of Risk / Assurance attended several GCIO
workshops in which other agencies shared the lessons they had learned in developing and
implementing formal assurance plans.
Agencies reported that key to the success of an operations assurance plan is good engagement
between ICT and the business on risks. Those responsible for implementing this plan should help
the business and ICT understand and agree to the linkage between business objectives and ICT
risks. In this way ICT staff will have greater appreciation for the business goals ICT supports, and
business managers will have a better appreciation of how ICT risks impact their goals. If this is
done well, it will be clear that assurance planning is not a compliance exercise, but a driver of value
for the organisation.
In developing this plan we held three workshops with business and ICT management stakeholders
and team leaders to discuss the linkage between business goals and ICT risks. These were
valuable discussions that helped those who will direct ICT assurance activities better understand the
current priorities of business managers. The discussions also helped shape the focus, frequency
and scope of assurance activities for the upcoming year. The business managers who participated
obtained a better understanding of the ICT risks and opportunities that underlay the initiatives and
deliverables that are top of mind for them. Following the workshops, we saw increased engagement
and more frequent discussions between ICT and the business at multiple levels, reflecting a new,
common understanding of risk and the value of assurance.
FY 2016 Assurance Plan – Version 0.9 (Web SAMPLE)
31 May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 9 of 24
2.3
Decisions / Assumptions
Due to a limited assurance budget, we were not able to include in our FY15/16 schedule assurance
activities covering all the controls and other mitigations that work to keep our risk within an
acceptable level.1
For example, we were only able to schedule limited coverage of the moderate risk areas in scope
(areas 6-9 in Section 1.3). However, we have planned at least one assurance activity in each area.
We note that in many areas of ICT, new controls are being embedded to bring the level of risk within
the “risk appetite” expressed by the Senior Leadership Team (Appendix 2). Implementing these
controls has a cost, as does providing for continued assurance over them. Some of this cost can be
recovered through efficiencies identified through the assurance activities themselves (e.g. some
assurance activities pay for themselves).
Better management of the service portfolio and supplier management are two areas in scope where
the assurance investment is most likely to result in tangible cost savings and direct financial value to
ICT and the agency in the near and long term.
2.4
Roles, Accountability and Responsibilities – Individual Activities
As discussed above, many parties will be involved in providing the required assurance, including:














Front line staff – Routine checks.
Management – Monitoring and upward reporting of KPIs, risks and issues.
Service desk – Aggregate reporting on events, incidents, and problems.
Risk team – Risk registers, operational monitoring reports and deep-dive reviews to help us
manage risk.
Security team – Oversight on patch levels, vulnerabilities, security incidents, and other areas.
Privacy team – Breach reporting and analysis by which we can assess our privacy controls.
Internal audit – Scheduled ICT audits according to the three-year internal audit plan.
External audit – External audit procedures which may provide assurance.
Security contractor –Services such as independent controls testing and penetration testing to
help us identify exposures.
Data centre provider – Monitoring reports, notifications, and SLA reporting as agreed. Also
provides annual “SOC2” assurance reports which independently confirm its controls are in
place.
Supplier manager—Monitoring the performance of suppliers, including obtaining assurance
from them.
Management consultants – Assessments of where we can achieve more value for our ICT
investment, and better align our initiatives to our strategic and operational goals.
External agencies / regulators – Views on compliance and risk within the context of their
mandates.
GCIO – Shared information on system-wide risks, lessons learned, assurance guidance.
For each activity, there will be two primary functional roles as follows:
This response is to illustrate that GCIO expects agencies to report any difficulties in meeting assurance requirements,
including resource constraints. A statement like this would likely be followed up with discussions with GCIO as to whether
the decision to delay the needed assurance is reasonable.
1
FY 2016 Assurance Plan – Version 0.9 (Web SAMPLE)
31 May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 10 of 24


The activity owner, or sponsor, will be the management-level employee or executive who must
ensure that the assurance activity is carried out and that the results are delivered according to a
terms of reference or similar agreement.
The assurance provider is responsible for carrying out the activity according to the terms of
reference, and delivering results in timely manner.
Specific activities and deliverables are listed in the Assurance Schedule (Section 3).
2.5
Assurance Budget
The estimated cost of the FY15/16 assurance activities is as below. This amount comes from
various departmental budgets, including Risk, Internal Audit, and other functional teams, in addition
to ICT, and is a rough estimate of the cost only. The estimate does not include assurance costs
borne by suppliers.
Although risk and assurance are ultimately part of everything we do, the amount below does not
include the cost of all controls or routine risk management activities embedded in business-as-usual
operational processes. It includes only the assurance activities that report upward to give us
confidence that our controls and mitigations are working.
NZD $
Estimated Assurance Cost
2.6
$xxx,xxx
Assurance Schedule
Refer to Section 3 for the schedule of assurance activities planned for FY16.
FY 2016 Assurance Plan – Version 0.9 (Web SAMPLE)
31 May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 11 of 24
3.
DETAILED ASSURANCE SCHEDULE
Below are the assurance activities that will occur in FY16 over ICT Operations:
Risk
Area
(see
Legend)
Assurance
Activity
Control Objective
Specific Activity and Deliverable
1, 3
User access
reviews
Access to network /
system / folders is
authorised
ICT sends list of current users to
department heads and supplier
managers, also noting users with
remote access. Department
heads review and sign off
attesting that access for users in
their area is appropriate.
Exceptions must be noted with
evidence of follow-up attached.
ITSM reviews for completeness.
1
Remote
access token
audit
Remote access is
authorised.
1
User access
controls audit
Logical access is
generally wellcontrolled.
Owner
Assurance Provider
Frequency /
Timing
Key Risk
High / Medium
CIO
Department heads,
Supplier managers
ITSM reviews for
completeness
Quarterly
Information may be
accessed / accessible
by unauthorised
person.
Staff may be using
unlicensed software
and this may result in
a legal penalty or
security breach.
Physical stocktake of remote
access tokens and comparison
with token register maintained by
ICT.
ITSM
Security team
Q2
(Annual)
Information may be
accessed / accessible
by unauthorised
person.
Review of the design and
effectiveness of user access
controls. Internal Audit produces
a report with recommendations.
Management (department heads)
are responsible for providing a
response and remedial actions for
any findings.
Manager,
Internal
Audit
Internal audit
Q3 (Triannual)
Information may be
accessed / accessible
by unauthorised
person.
Department
heads
(response
and
actions)
Legend: Key risk areas = (1) Information Security Mgmt.; (2) Service Continuity Mgmt.; (3) Service Portfolio Mgmt.; (4) Capacity Mgmt., (5) Supplier Mgmt.
FY 2016 ICT Operations Assurance Plan (SAMPLE)
May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 12 of 24
Risk
Area
(see
Legend)
Assurance
Activity
Control Objective
Specific Activity and Deliverable
Owner
Assurance Provider
Frequency /
Timing
Key Risk
High / Medium
1
Encryption
testing
Data is encrypted as
per our security
standards
Security staff run a series of tests
on network segments or functions
where encryption is required.
ITSM
Security team
Q1, Q4
(Twice
yearly)
Information may be
accessed / accessible
by unauthorised
person.
1
Review of
privileged user
access (logs)
Super-user access to
the network, operating
system and direct
access to the
databases is
authorised and
monitored.
Risk team reviews system activity
logs on a sample basis to
determine whether activity by
privileged users is appropriate.
Risk
Manager
Risk team
Q4
(Annual)
Information may be
accessed / accessible
by unauthorised
person.
1
Review of
privileged user
access
(controls)
Super-user access to
the network, operating
system and direct
access to the
databases is
authorised and
monitored.
Internal Audit reviews the design
and effectiveness of controls
related to super user and direct
data access.
Manager,
Internal
Audit
Internal Audit
Q3
(Annual)
Information may be
accessed / accessible
by unauthorised
person.
Suppliers may not be
protecting our
information (including
DR).
1
Sensitive data
alert review.
Super-user access to
the network, operating
system and direct
access to the
databases is
authorised and
monitored.
Internal audit tests alerts on
sensitive data tables to ensure
triggers are working, and reviews
a sample of historical alerts to see
whether appropriate follow-up
was done.
ITSM
Internal Audit
Monthly
Information may be
accessed / accessible
by unauthorised
person.
1,5
Site alarm
testing and
report review
Data centre is alarmed
at perimeter and at
internal doors.
Service provider tests alarms, and
the data centre manager reviews
and reports on the results of
testing, and on alerts and alarms
raised during the week.
Supplier
manager
Data centre
provider
Weekly,
reported in
data centre
provider’s
monthly
report
Information may be
accessed / accessible
by unauthorised
person.
Legend: Key risk areas = (1) Information Security Mgmt.; (2) Service Continuity Mgmt.; (3) Service Portfolio Mgmt.; (4) Capacity Mgmt., (5) Supplier Mgmt.
FY 2016 ICT Operations Assurance Plan (SAMPLE)
May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 13 of 24
Risk
Area
(see
Legend)
Assurance
Activity
Control Objective
Specific Activity and Deliverable
Owner
Assurance Provider
Frequency /
Timing
Key Risk
High / Medium
1,5
Review of door
/ server rack
access logs
Data centre door
access is limited to
authorised staff.
Data centre manager reviews
access logs for doors and server
racks and compares against
authorised access list. Signs
check sheet to evidence review.
Supplier
manager
Data centre
provider
Weekly,
reported in
data centre
provider’s
monthly
report
Information may be
accessed / accessible
by unauthorised
person.
1
Inspections of
locks, cabling,
network jacks
at all offices
Sensitive ICT
equipment and access
points at our offices
are secured.
Security team members inspect
for physical security exposures at
all sites using a good practice
checklist.
ITSM
Security team
Q1
(Annual)
Information may be
accessed / accessible
by unauthorised
person.
1,5
Review of site
visitor logs
Visitors to the data
centre are authorised.
Supplier manager compares
visitor access log and systemgenerated logs to the list of preauthorised visitors. Supplier
manager signs off that all visitors
were authorised.
Supplier
manager
Supplier manager
(Based on
documentation
provided by data
centre manager)
Monthly
Information may be
accessed / accessible
by unauthorised
person.
ISAE (NZ) 3000 Service
Organisation Controls Report on
AICPA Trust Service Principles.
The report follows the SOC 2
model (USA/Canada).
ITSM
1,3,4,5
SOC 2 report
on data centre
controls
Physical access is
generally wellcontrolled.
Devices / processes
ensure uninterruptible
power.
Suppliers may not be
protecting our
information (including
DR).
Data centre
provider orders
report by an
independent
service auditor
(Data centre
provider funds the
review)
Q1
(Annual)
Information may be
accessed / accessible
by unauthorised
person.
Suppliers may not be
protecting our
information (including
DR).
Legend: Key risk areas = (1) Information Security Mgmt.; (2) Service Continuity Mgmt.; (3) Service Portfolio Mgmt.; (4) Capacity Mgmt., (5) Supplier Mgmt.
FY 2016 ICT Operations Assurance Plan (SAMPLE)
May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 14 of 24
Risk
Area
(see
Legend)
Assurance
Activity
Control Objective
Specific Activity and Deliverable
Owner
Assurance Provider
Frequency /
Timing
Key Risk
High / Medium
1,5
External
penetration
test
Network perimeter is
secured against
intrusion.
Set of tests run by a security
contractor simulating an attack via
the Web. Security contractor
provides a report with findings
and recommendations.
Supplier
manager
Security contractor
Q1
(Annual)
Information may be
accessed / accessible
by unauthorised
person.
1
Internal
penetration
test
Systems are secured
against internal attack.
Set of tests run by a security
contractor simulating an attack
from within the agency. Security
contractor provides a report with
findings and recommendations.
ITSM
Security contractor
Q1
(Annual)
Information may be
accessed / accessible
by unauthorised
person.
1
Fraud Risk
Review
Systems are secured
against internal attack.
Fraud risks are assessed and
ranked, possibly identifying ICT
exposures. Report produced, and
actions identified.
CISO (with
regard to
the ICTrelated
risks)
Internal audit
Q3
(Annual)
Information may be
accessed / accessible
by unauthorised
person.
1
Critical and
high security
patch level
reporting
Important software
patches are applied.
Security team reports on
outstanding critical and high
security patches, noting any
approved exemptions and
timetable for patching.
ITSM,
Technical
leads
(response
and
actions)
Security team
provides report.
Monthly
Information may be
accessed / accessible
by unauthorised
person.
Vulnerability
mitigation
reports
Vulnerabilities are
managed.
Security team reports on known
vulnerabilities and mitigations.
Report is updated monthly.
ITSM
Security team
(requires input from
technical leads)
Monthly
Information may be
accessed / accessible
by unauthorised
person.
1
Technical leads are
assigned to
complete
remediation.
Legend: Key risk areas = (1) Information Security Mgmt.; (2) Service Continuity Mgmt.; (3) Service Portfolio Mgmt.; (4) Capacity Mgmt., (5) Supplier Mgmt.
FY 2016 ICT Operations Assurance Plan (SAMPLE)
May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 15 of 24
Risk
Area
(see
Legend)
Assurance
Activity
Control Objective
Specific Activity and Deliverable
Owner
Assurance Provider
Frequency /
Timing
Key Risk
High / Medium
1
Privacy breach
reporting and
analysis
Privacy breaches are
reported and
assessed.
Privacy officer reviews and
reports on breaches reported
during the previous month,
identifying trends, internal control
weaknesses, and lessons
learned.
Privacy
officer
Privacy officer
Monthly
Information may be
accessed / accessible
by unauthorised
person.
1
Privacy
controls review
Privacy controls are
being followed.
Internal audit assesses the
privacy controls in place, testing
to for control effectiveness.
Chief
executive
Internal audit
Q1 (Biannual)
Information may be
accessed / accessible
by unauthorised
person.
1
Privacy impact
analysis (PIA)
updates
Privacy risks are
revisited when
systems undergo
changes impacting
privacy.
Triggered by CAB flagging of
changes that might have a privacy
impact, systems are re-assessed
for privacy. Artefacts are
produced that supplement the
original PIA.
Privacy
officer
Privacy team in
collaboration with
system owner and
technical leads
Upon
changes to
systems
that could
impact
privacy
Information may be
accessed / accessible
by unauthorised
person.
1
Privacy
maturity
assessment
Our privacy maturity is
known and
continuously improved.
Privacy specialists conduct highlevel maturity assessment of
privacy practices, assessing
against the Privacy Act.
Privacy
officer
Privacy contractor
Q4 (Biannual)
Information may be
accessed / accessible
by unauthorised
person.
1
Security
training /
induction
summary
reporting.
Employees and
contractors are
inducted and
periodically trained on
their security
responsibilities.
Security team verifies all new
starters during the previous month
(employees and contractors) have
received security induction and
have signed off on acceptable use
policy.
ITSM
Security team
Monthly
Information may be
accessed / accessible
by unauthorised
person.
1
Internal
security
breach
analysis
We use learnings from
internal security
breaches to strengthen
our security
programme.
Roll-up analysis of any internal
security breaches that occurred
during the previous two quarters,
to include instances of security
policy / acceptable use violations.
ITSM
Security team
Q2 and Q4
(Twice
yearly)
Information may be
accessed / accessible
by unauthorised
person.
Legend: Key risk areas = (1) Information Security Mgmt.; (2) Service Continuity Mgmt.; (3) Service Portfolio Mgmt.; (4) Capacity Mgmt., (5) Supplier Mgmt.
FY 2016 ICT Operations Assurance Plan (SAMPLE)
May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 16 of 24
Risk
Area
(see
Legend)
Assurance
Activity
Control Objective
Specific Activity and Deliverable
Owner
Assurance Provider
Frequency /
Timing
Key Risk
High / Medium
1
System
accreditation
Systems are
accredited.
Systems are formally accredited
and the residual risk accepted,
following a robust certification
process. (Cost estimate includes
certification)
Chief
executive
CISO
Upon
renewal of
accreditatio
n
Information may be
accessed / accessible
by unauthorised
person.
1
Accreditation
status
reporting
Systems are
accredited.
Monthly updates from CISO to
CIO on the certification and
accreditation status of systems.
CIO
CISO
Monthly
Information may be
accessed / accessible
by unauthorised
person.
2
Application
portfolio
analysis
We know where our
systems are providing
value and where they
are not.
We know what options
are available in the
market.
Complete the GCIO Application
Portfolio Management (APM)
survey, which will give insights
into our application portfolio,
including risks and opportunities
to increase value.
CIO / GCIO
CIO
Q2 (One
off, but
other
related
assurance
activities
will follow)
Our ICT services could
be providing greater
value.
2
Ageing
systems report
Software that is no
longer supported and
outdated infrastructure
is replaced.
Quarterly tracking of outdated
software and infrastructure to give
visibility on status of systems.
Report to the CIO.
CIO
ICT Operations
Manager
Quarterly
Our ICT services could
be providing greater
value.
2,4
Infrastructure
status and
strategy
report.
Infrastructure is well
managed to ensure it
is providing business
value.
Current and target state of
infrastructure is reported and
linked to current business strategy
/objectives. Report to the CIO.
CIO
Infrastructure
Manager
Q1
(Annual)
Our ICT services could
be providing greater
value.
2,4
Network
monitoring
summary
The network is well
managed and meets
business needs.
Performance reporting to CIO with
commentary on linkage to
changing business requirements.
CIO
Network
Administrator
Monthly
ICT systems may not
provide sufficient
storage and
performance.
Legend: Key risk areas = (1) Information Security Mgmt.; (2) Service Continuity Mgmt.; (3) Service Portfolio Mgmt.; (4) Capacity Mgmt., (5) Supplier Mgmt.
FY 2016 ICT Operations Assurance Plan (SAMPLE)
May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 17 of 24
Risk
Area
(see
Legend)
2,4
Assurance
Activity
User survey
Control Objective
The network is well
managed and meets
business needs.
We track and follow up
on incidents related to
storage and
performance.
Specific Activity and Deliverable
Owner
Users complete a survey on a
number of areas such as network
latency, download speeds,
application crashes. Users are
asked to identify how IT
applications and infrastructure
can better help them achieve their
goals.
CIO
Assurance Provider
Frequency /
Timing
ICT Operations
Manager
Q1
(Annual)
Key Risk
High / Medium
Our ICT services could
be providing greater
value.
ICT systems may not
provide sufficient
storage and
performance..
Other objectives
2
Storage
monitoring
summary
Storage is well
managed and meets
business needs.
Performance reporting to CIO with
commentary on linkage to
changing business requirements.
CIO
Network
Administrator
Monthly
ICT systems may not
provide sufficient
storage and
performance.
2
Software
license audit
All our software is
properly licensed.
Compliance review and report of
software licenses across the
application portfolio.
CIO
Risk team
Q3
Our ICT services could
be providing greater
value.
Staff may be using
unlicensed software
and this may result in
a legal penalty or
security breach.
1,2
Unapproved
software audit
Staff are installing only
approved software.
Compliance review of installed
software using automated tools.
ITSM
Security team
Monthly
Information may be
accessed / accessible
by unauthorised
person.
1,2
Unapproved
cloud / web
service audit
Staff are not using
unapproved cloud
services (Dropbox,
Gmail).
Compliance review of installed
software using automated tools.
ITSM
Security team
Monthly
Information may be
accessed / accessible
by unauthorised
person.
Legend: Key risk areas = (1) Information Security Mgmt.; (2) Service Continuity Mgmt.; (3) Service Portfolio Mgmt.; (4) Capacity Mgmt., (5) Supplier Mgmt.
FY 2016 ICT Operations Assurance Plan (SAMPLE)
May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 18 of 24
Risk
Area
(see
Legend)
Assurance
Activity
Control Objective
Specific Activity and Deliverable
Owner
Assurance Provider
Frequency /
Timing
Key Risk
High / Medium
3
Disaster
recovery test
and report
Disaster recovery can
restore systems in
accordance with
business requirements
Test of disaster recovery plan,
and report of results with analysis
and recommendations.
CISO
ICT Operations
Manager
Quarterly
Capability / capacity to
provide IT services
may be lost following a
disaster / outage.
Suppliers may not be
protecting our
information (including
DR).
3
Independent
review of BCP
/ DR plans
Disaster recovery
plans and controls are
robust and fit for
purpose.
Review of disaster recovery plans
and comparison to recognised
good practice controls and
procedures.
CISO
Internal audit
Q3 (Triannual)
Capability / capacity to
provide IT services
may be lost following a
disaster / outage.
3,5
Reporting on
success of
power tests
Devices / processes
ensure uninterruptible
power
Results of power testing included
in monthly SLA reporting pack.
Supplier
Manager
Data centre
provider
Monthly
Capability / capacity to
provide IT services
may be lost following a
disaster / outage.
Suppliers may not be
protecting our
information (including
DR).
3,5
Test restore of
data from
backup
Our data can be
restored from backup.
Test restore of data, with
summary report and
recommendations.
ITSM
ICT Operations
Manager
Quarterly
Capability / capacity to
provide IT services
may be lost following a
disaster / outage.
3
Verification of
DR plan key
contact
numbers
Details in our disaster
recovery plans are up
to date.
Administrator verifies and updates
details.
ITSM
ICT administrator
Monthly
and as
needed
Capability / capacity to
provide IT services
may be lost following a
disaster / outage.
Legend: Key risk areas = (1) Information Security Mgmt.; (2) Service Continuity Mgmt.; (3) Service Portfolio Mgmt.; (4) Capacity Mgmt., (5) Supplier Mgmt.
FY 2016 ICT Operations Assurance Plan (SAMPLE)
May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 19 of 24
Risk
Area
(see
Legend)
Assurance
Activity
Control Objective
Specific Activity and Deliverable
Owner
Assurance Provider
Frequency /
Timing
Key Risk
High / Medium
3
Business
Impact
Analysis
Disaster recovery
plans are aligned with
business
requirements.
Critical functions are assessed in
a BCP / DR context and RPO and
RTO are reconfirmed.
CIO
Business continuity
response team
leads, with
business input
Q4
(Annual)
Capability / capacity to
provide IT services
may be lost following a
disaster / outage.
4,5
Performance /
storage
incident
reporting
We track and follow up
on incidents related to
storage and
performance.
Performance and storage
summary, including metrics and
incident summary.
ICT
Operations
Manager
Service desk
Monthly
ICT systems may not
provide sufficient
storage and
performance.
1,3,5
GCIO cloud
assessment
tool
Cloud systems can
provide sufficient
storage and
performance
Complete risk assessment and
related tool as per the GCIO
publication “Cloud Computing:
Information Security and Privacy
Considerations.”
Chief
Executive
CIO
One per
cloud
supplier.
For new
systems
this will be
done
alongside
certification
. For
existing
systems,
refer to
schedule.
Information may be
accessed / accessible
by unauthorised
person.
Suppliers may not be
protecting our
information (including
DR).
We have considered
good practice in
managing cloud
suppliers.
Legend: Key risk areas = (1) Information Security Mgmt.; (2) Service Continuity Mgmt.; (3) Service Portfolio Mgmt.; (4) Capacity Mgmt., (5) Supplier Mgmt.
FY 2016 ICT Operations Assurance Plan (SAMPLE)
May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 20 of 24
Risk
Area
(see
Legend)
Assurance
Activity
Control Objective
Specific Activity and Deliverable
4
Operational
staffing needs
analysis
We have sufficient
operations and
management staff with
the right skills.
Analysis of current staffing levels
vs. forecasted needs, considering
existing skill sets. Reporting to
CIO.
5
Supplier
Management
Framework
Review
We have considered
good practice in
managing cloud
suppliers.
1,3,4,5
Key supplier
SLA
dashboard
1,3,5
Supplier
issues /
breach report
Owner
Assurance Provider
Frequency /
Timing
Key Risk
High / Medium
CIO
ICT Operations
Manager
New
updates
monthly
following
last year’s
big review.
Q4 –
(Annual
major
review,
monthly
updates)
We may not have
enough staff with the
right skills to meet our
objectives related to
ICT.
Analysis of the framework and
templates for supplier
management plans.
CIO
Internal Audit
Q1 (Oneoff)
Suppliers may not
perform and/or
opportunities to
increase value may be
missed.
We monitor and
assess the reports
provided by suppliers.
SLA reports from suppliers rolled
up into monthly report on key
KPIs with additional analysis.
CIO
ICT Operations
Manager
Monthly
Suppliers may not
perform and/or
opportunities to
increase value may be
missed.
We track important
supplier issues to
resolution.
Incident and breach reporting
from suppliers rolled up into
monthly summary with additional
analysis.
CIO
ICT Operations
Manager (Based on
ongoing monitoring
of breach / incident
register).
Monthly
Suppliers may not be
protecting our
information (including
DR).
Legend: Key risk areas = (1) Information Security Mgmt.; (2) Service Continuity Mgmt.; (3) Service Portfolio Mgmt.; (4) Capacity Mgmt., (5) Supplier Mgmt.
FY 2016 ICT Operations Assurance Plan (SAMPLE)
May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 21 of 24
Risk
Area
(see
Legend)
Assurance
Activity
Control Objective
Specific Activity and Deliverable
Owner
Assurance Provider
Frequency /
Timing
Key Risk
High / Medium
1,5
Verification of
supplier
certifications
Supplier independent
certifications / reports
are sufficient and
current.
Review of current status of any
relevant third-party certifications
claimed by suppliers.
ITSM
Security team
Q1
(Annual)
Suppliers may not be
protecting our
information (including
DR).
4,5
Strategic
analysis of
projected
needs vs.
supplier
capability
Supplier strategy is
aligned with longer
term business goals.
Check-up on alignment of
business strategy, ICT strategy,
and supplier capability projected
to 1, 2 and 5 years.
CIO
CIO
Q3
(Annual)
Current suppliers may
not be able to continue
to meet business
needs into the future.
Legend: Key risk areas = (1) Information Security Mgmt.; (2) Service Continuity Mgmt.; (3) Service Portfolio Mgmt.; (4) Capacity Mgmt., (5) Supplier Mgmt.
FY 2016 ICT Operations Assurance Plan (SAMPLE)
May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 22 of 24
The following activities have been deferred to FY17 for the reasons stated in Section 2.3:
Risk
Area
(see
Legend)
Assurance Activity
Control
Objective
Specific Activity and
Deliverable
Owner
Assurance
Provider
Frequency
Key Risk
High / Medium
5
Review of supplier
management plans
Controls and
procedures are in
place to manage
suppliers
consistently and
effectively.
Internal audit assessment of a
sample of plans to see if they
align with the supplier
management framework.
ICT Operations
Manager
Internal
audit
Bi-annual
Suppliers may not be
protecting our
information (including
DR).
Suppliers may not
perform and/or
opportunities to
increase value may
be missed.
5
Supplier health
checks
Suppliers are
reviewed for their
viability.
Analysis of factors that could
impact future performance key of
suppliers.
CIO
ICT
Operations
Manager
Annual
Current suppliers
may not be able to
continue to meet
business needs into
the future.
4
ICT governance
review
Our governance
groups have
sufficient ICT
understanding.
Survey of ICT and non-ICT
governance groups that impact
ICT. Do they need more training
to better inform decisions related
to ICT?
CIO
External
consultant
Bi-annual
We may not have
enough staff with the
right skills to meet
our objectives related
to ICT.
Legend: Key risk areas = (1) Information Security Mgmt.; (2) Service Continuity Mgmt.; (3) Service Portfolio Mgmt.; (4) Capacity Mgmt., (5) Supplier Mgmt.
FY 2016 ICT Operations Assurance Plan (SAMPLE)
May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 23 of 24
Risk
Area
(see
Legend)
Assurance Activity
Control
Objective
Specific Activity and
Deliverable
Owner
Assurance
Provider
Frequency
Key Risk
High / Medium
4
Functional staffing
needs analysis
We have
sufficient second
and third line
(functional) staff
with the right ICT
skills. (e.g.
Security, Risk,
Internal Audit).
Input is solicited from ITSM,
Privacy Officer, Risk and Internal
Audit on the state of their current
skill sets with regard to ICT.
CIO
(Other functional
leads retain
accountability for
their staffing)
Functional
Managers,
reporting to
CIO
Annual
We may not have
enough staff with the
right skills to meet
our objectives related
to ICT.
4
Capacity planning
We forecast
demand to plan
strategically for
capacity.
Using modelling tools, update
capacity forecast, applying
scenario analysis. Report.
CIO
ICT
Operations
Manager
Quarterly
ICT systems may not
provide sufficient
storage and
performance.
Legend: Key risk areas = (1) Information Security Mgmt.; (2) Service Continuity Mgmt.; (3) Service Portfolio Mgmt.; (4) Capacity Mgmt., (5) Supplier Mgmt.
FY 2016 ICT Operations Assurance Plan (SAMPLE)
May 2015
This is an illustrative example only – it should not be taken as a benchmark or government policy
Page 24 of 24
Download