Can Cybersecurity Framework Implementation Transform From Standard To Innovative?
Can Cybersecurity Framework Implementation Transform From Standard To Innovative?
framework
implementation
transform from
standard to innovative?
ey.com/better working world
#BetterQuestions
Overview
The paper talks about how ICT organizations are leading digital
advancements in the world, but how this advancement is actually
exposing many areas of risk. The paper starts by suggesting a few steps
before starting to develop the framework. It challenges a one-size-
fits-all framework so it is essential to profile companies (see section 6)
to determine size and maturity. The next thing discussed is the need
to focus on the people, process and technology in order to analyze the
domain and supporting domains such as vulnerability, threat, incident
and crisis management. Then focuses on developing the framework
(part 8) while emphasizing three important steps: current state analysis,
benchmarking and gap analysis. The paper concludes with discussions
that talk about the framework and guidelines.
02 Executive summary 06
03 Introduction 07
04 Framework development 08
07 Lessons learnt 22
08 Conclusion 24
09 Contributors 27
10 Contacts 28
11 Glossary of terms 29
Digital
The intrinsic nature of many ICT products and services — software, games,
films, and other products delivered to a growing list of platforms — makes
cybersecurity particularly challenging for ICT organizations.
A connected world
More devices are connecting to the internet and each other through the IoT
(sensors, actuators, etc.), exponentially increasing the number of potential
entry points for cybercriminals.
Identify
Analyze
Develop
Domain
Lifecycle
Elements
Governance requirements
Activities RACI
Suggested tools
Metrics Skills and Certification
Supporting domains
Each layer should be thoroughly considered in terms The design structure of each of the four domains should
of significance or value it will deliver for the overall include a lifecycle (outlined in Figure 4), that must be
implementation of the framework. The consensus is that broken down into elements that encompass a set of
the resulting framework structure will ensure that the required activities to support the capability building, based
methodology of people, process and technology (in which on three pillars (i.e., people, process, technology). The
the balance of people, process, and technology drive detailed guidelines for each domain will provide details
action) is woven into the fabric of each domain and covers a on these elements and relevant pillars (i.e., suggested
broader lens of processes across an ICT organization. activities, metrics, RACI, skills and certifications, and
suggested tools).
During the process, where EY teams implement ideas,
several local regulations, industry standards, and good The framework should also comprise of four suggested
cybersecurity practices were considered, in addition to domains that are essential for an effective cybersecurity
the requirements identified within the preceding phases of defense program: vulnerability, threat, incident and crisis
current state assessment, gap analysis, and benchmarking. management.
Some of the common industry standards and good
cybersecurity practices we considered are the Saudi
CITC CRF (Communications and Information Technology
Commission Cybersecurity Regulatory Framework), Saudi
NCA ECC (National Cybersecurity Authority Essential
Cybersecurity Controls), ISO (International Organization
for Standardization) 27001, NIST CSF (National Institute
of Standards and Technology Cybersecurity Framework),
NIST (National Institute of Standards) 800-53, BS (British
Standards) 11200.
1. Develop LPL
Although the ICT organizations at the global level are rapidly growing, they
might remain mostly underdeveloped in terms of cybersecurity procedures.
As per interviews with key stakeholders of organizations, it was observed
that many organizations and their employees have yet to completely
comprehend their cybersecurity duties and obligations. In such a case, prior
to developing the framework and related recommendations, it is required
to assess the present environment across the four domains and identify
critical areas for development inside the organizations, and therefore the
ICT sector. While the need to perform a current state assessment should be
evident based on internal discussions, the challenges might remain in terms
of identifying the best possible way to go about it. By performing multiple
brainstorming sessions it can be agreed that an LPL should be defined
and consist of good cybersecurity practices and also leveraging industry
standards such as ISO (International Organization for Standardization)
27001, NIST CSF (National Institute of Standards and Technology
Cybersecurity Framework), BS (British Standards) 11200, etc. For example,
during the development phase of the framework, to ensure that the local
landscape was embedded within the LPL, applicable regulatory frameworks
such as Saudi CITC CRF (Communications and Information Technology
Commission Cybersecurity Regulatory Framework) and Saudi NCA ECC
(National Cybersecurity Authority Essential Cybersecurity Controls) were
given a high degree of importance. The resulting outcome is the LPL which
essentially consists of the following components:
Company profiling
The company profile questionnaire is a five-category model to be used to
categorize entities into five-tiers based on the size, type, and complexity of
operations for the organization being evaluated. The organization profile
exercise includes a variety of parameters that impact an organization’s
operations, including but not limited to the number of workers, the number
of offices, recent changes in the IT infrastructure and the number of cyber
attacks faced.
ea men
Security capabilities
An
t
ag
e
ec
t
Vu
aly
Coll
Current General
ze
state
assessment assessment
ent
ma
s
Cr ag
emis i
n
Inc ag
d
i
Report ent n
Virtual validation
4 ma 3
sessions
The comprehensive exercise provides insights into the current state of practices and capabilities across the four domains.
Geographical proximity, cultural similarity to KSA, presence of AE-CERT, established information assurance
regulations.
Established implementation plan to the national-level cybersecurity strategy, presence of a formal Cybersecurity
and Infrastructure Security Agency, G20 Country.
Established implementation plan to the national-level cybersecurity strategy, contribution to the international
cybersecurity standards, G20 Country.
Figure 6: Countries selected for benchmarking exercise and associated rationale for selection
Company selection
Benchmarking exercise
(Based on pre-defined criteria)
Selected
To support gap analysis and conclude gap at two levels:
Entity
(IT Company (small, medium, large)) National and
1 2 Company level
sectorial level
Performs
(self-assessment)
Gaps
Company profiling and domain assessment concluded by:
(Leveraging the co-developed LPL)
Obtaining country-level
data of established Comparing observed
Identifies leading best practices current state/maturity
for WI&CM domains from against recommended
benchmarked leading target maturity
Complexity and capabilities
countries
Concludes
Which feeds/contributes
into the development of
Current state or maturity level
VTI&CM Framework + Guidelines
Followed by ... (tailored for IT sector)
Supported by
This section of the design structure covers the four primary domains that are essential
for a cybersecurity defense program. The domains should be chosen on the basis of their
Domain high significance in the overall management of threats affecting the nation. This section
includes the following four domains: vulnerability management, threat management, incident
management and crisis management.
The lifecycle provides a guide to ensure that cybersecurity is continually improved, and it
Lifecycle helps companies reduce and better manage cybersecurity risks pertaining to the four domains
as mentioned above.
Component
The pillars and associated guideline components act as enablers for the successful
implementation of the requirements of a particular domain. Each pillar is essential for a
company to consider, as the failure to upscale capability in any one particular pillar might
result in an inconsistent and inefficient cybersecurity program. Therefore, each pillar must
be well understood by the executive management of the company and its staff prior to
Pillars implementation. The pillars encompass the following:
• People: RACI skills and certifications
• Processes: activities, example metrics
• Technology: tools and technologies
Other
Other supporting domains cover the additional areas of cybersecurity that could be
supporting considered by the companies for wider coverage of the main domain.
domains
Upon defining drivers to increase the cybersecurity capability level in the company, the
Implement approach defines how a company follows the process of complete profiling to
Implement identify the company’s complexity level, assess the current capability state of the defined
cybersecurity domains, and enables the company to implement improvement to achieve the
expected capability levels by following comprehensive guidelines and supportive documents.
Upon deciding the change in the company’s environment, structure, or technologies and
Approach
infrastructure, the Change approach defines how a company follows the process of re-
profiling in areas of change to identify the updated company complexity level induced by the
Change change, reassess the current capability state of the defined cybersecurity domains in areas
of change, and enables the company to implement improvements to maintain the expected
capability levels by following comprehensive guidelines and supportive documents.
Upon planning for maintenance and improvement of the cybersecurity capability level
in the company, the Maintain and Improve approach defines how a company follows the
process of maintaining the company’s profile by updating the company’s complexity level,
Maintain and
reassessing the current capability state of defined cybersecurity domains and identifying
improve gaps of implementation, and enables the company to apply corrective actions to achieve
the expected capability levels or enhance them by following comprehensive guidelines and
supportive documents.
Guidelines
The purpose of these guidelines is to give guidance and
advice to ICT organizations on effective cybersecurity
practices across the four aforementioned categories.
Although the document is not mandatory, organizations are
encouraged to implement the necessary level of controls to
improve their cybersecurity posture. The guidelines provide
a systematic and comprehensive approach to identify
cybersecurity controls required to enhance cybersecurity
capability levels.
E
nable the ease of identification of effective
cybersecurity and resilience improvement activities
E
nable the setting of meaningful target
cybersecurity levels for companies
B
e as straightforward and
cost-effective to apply as possible
A
llow companies to enhance their
cybersecurity posture
Domain
Lifecycle
Elements
Governance requirements
Activities RACI
Suggested tools
Metrics Skills and certification
Supporting domains
Significance
The framework and its accompanying principles are associated guidelines aim to solve this issue by allowing
indicators of good cybersecurity practices that ICT organizations to identify their respective complexity level
organizations must adopt and execute. They offer a uniform (through company profiling) and thereby identifying the
approach for organizations to improve and grow their level of cybersecurity maturity it needs to achieve which is
cybersecurity posture across the four domains as well as commensurate with its size and complexity. The framework
to assure the establishment of a robust infrastructure. and guidelines that EY teams have developed and put into
In the absence of granular and precise processes for practice is truly considered to be one of the best-in-class as
improving cybersecurity postures that are linked with size, it does not consider a one-size-fits-all approach and goes
complexity, and nature, organizations may struggle to grasp into the granular organizational details prior to defining the
the degree of investment and competencies necessary required state or target state of cybersecurity maturity.
to operate a cybersecurity program. The framework and
Open-communication channels
1 These are necessary as the exercise involves several subject
matter resources (SMRs) who will contribute a fair deal to the
success of this project
a pab p
ple
c ge cid
ed ro
p
d
me
le
n
St
ct ch
m
ions o
exp t im
act ed
nta
Plan
en
it v pect and i ma
tat
n
n
leve exp
to ac orre e
tion
me
mp i
t
ch
r
an
hie c
tain
l
ls
i
Imple
nt vem
ge
en ent
o
Main
a
c
anc
l ev a n y
R e -a s o r a r
curr nd i
Re t c
y
el
level
ex o m p
ss
o f l ex i t
en d
-a
ang
ap ess
a
ses ea
Pe r
a te l
c
: As
en a bi
as m p
ch
g
xity
Advantages of the U pd mp
sc s
t i fi l i ty
filin
for nd
re Co
co
ur
y ga ss
ses
p le
n
m qu
of t c ps
framework s s e a re
a
pro
ch a
m
d o es
pab a
s
a i -
Re for
co
ng l i ty
cu
in
m
ny
e l n
l ev e
a
ti o a s
y
pa
rre
pa
ab nt m
upscale their security posture and attain a level ilit Iden fo
r
y& er
of maturity that is commensurate with their risk ide 1:P
ntif p
levels. To guide ICT organizations, the following y gaps Ste
implementation lifecycle can be considered.
Majd Almjally
Governance & Compliance Director
Email: [email protected]
Ritesh Guttoo
Partner, EY Africa Cybersecurity Leader
Ernst & Young Ltd, Mauritius
Email: [email protected]
Salam Shouman
Director, Technology Consulting
Ernst & Young Jordan
Email: [email protected]
Lavnya Mohonee
Partner, Technology Consulting
Ernst & Young Ltd, Mauritius
Email: [email protected]
Siddhesh Mudbhatkal
Manager, Technology Consulting
Ernst & Young Ltd, Mauritius
Email: [email protected]
Hemkesh Jhamna
Senior Consultant, Technology Consulting
Ernst & Young Ltd, Mauritius
Email: [email protected]
ey.com