Process: A72 - Security Management
Identify security threats, determine risks and vulnerabilities which affect the IT organization or that IT can affect, and recommend mitigating changes based on this analysis. To get more information, select Description (introduction and list of tool mentors), Work Breakdown Structure (workflow diagram and table), Team Allocation (table of roles), or Work Product Usage (table of work products).
DescriptionWorkflowRolesWork Products
Purpose

The purpose of the Security Management process is to establish and operate security controls and protections over all IT assets and services in order to conform to overall business security as well as IT-specific requirements. It includes activities to mitigate the risk posed by malicious outsiders and insiders, and to decrease vulnerabilities in the IT services, systems and processes that would make it easier for such malicious parties to succeed.

Relationships
Context
Description

Read the Security Management Key Concepts.

Important links

Outcomes

As a result of the successful implementation of the Security Management process:

  • The confidentiality, integrity, and accessibility of information meets agreed requirements:
    • Information is available for approved purposes
    • Accessors (whether internal or external) for protected items can be validated and tracked
    • Information and systems are protected from unauthorized access and any attacks
  • IT services and infrastructure meet external security requirements from service level agreements, contracts, and legislative dictates
  • IT security aligns with the business' overall security requirements
  • The reputation of the business as secure and trustworthy is protected

Scope

The process covers the life cycle of security concerns, including planning, operational measures, evaluation, and audit. It will identify IT security threats, vulnerabilities, and risks in order to develop an overall approach to counter and handle them that is aligned with business security requirements. It will operate security protections and mechanisms which meet the desired level of confidentiality, availability and integrity for information and IT services.

Includes

  • Information security policy
  • Specification of information security controls including asset use, access, documentation, and information controls and overseeing their establishment
  • Operation of controls and measures such as:
    • Credential operations
    • Perimeter defense
    • Intrusion detection
    • Secure coding standards
    • Key and encryption management
    • Separation of duties
    • Application isolation
  • Identification of IT security incidents
  • Management of supplier and partner access to services and systems
  • Compliance enforcement measures (related to security)

Excludes

  • Establishment and maintenance of identities and access rights (Identity and Access Management)
  • Health and safety (Business responsibility, with contribution from Facilities Management)
  • Business security management, including trust management as it relates to business processes (Business responsibility)
  • Identification of privacy requirements (within the scope of Compliance Management)

Key performance indicators

  • Number of known security requirements. This includes security requirements from:
    • Service level agreements and operating level agreements
    • Contracts
    • Applicable legislation in each geography
    • Corporate requirements
    • Business unit (customer) objectives
  • Number of known security requirements for which compliance is validated or not validated
  • Incident management metrics for security. See the KPI for Incident Management

Relation to other processes

For more information

For more information, see Security Management in the ITIL® documentation.

In addition, see the IBM® Service Management Web page.

2 ISO 17799 is broader than ITIL, so the scope will be broader. For instance, physical security is specifically not covered by ITIL, but is covered by ISO 17799.

Properties
Event Driven
Multiple Occurrences
Ongoing
Optional
PlannedYes
Repeatable
More Information