Overview
ABSTRACT
What do we mean by information systems security, for what purposes and with what organization?
This article details the key principles of information systems security, and discusses how to organize such systems, in an increasingly regulated context and in the face of ever-greater exposure to data-related risks. Governance, organizational, human and technical resources are detailed in the article, along with a number of illustrations.
Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.
Read the articleAUTHOR
-
Nicolas DUFOUR: Doctor of Management, Associate Professor, CNAM LIRSA
INTRODUCTION
The organization of IS (Information Systems Security) can be viewed from a number of complementary angles. It is not only a question of risk governance, but also of a set of organizational and technical measures and resources organized around security objectives deployed within an organization.
"Organizing information systems security is always a balancing act between security objectives on the one hand, and user experience on the other, both of which are constrained by resources, but also by time. One of the difficulties we face is to avoid falling into a security trap that would drastically reduce performance, or falling into the other trap, which would lead us to neglect security for the sake of efficiency and purely financial or commercial effectiveness. We have to constantly oscillate between safety first and business first, and both issues have their non-negotiable practices, i.e. the limits of risk that must not be crossed in the case of safety, and the need to take operational needs into account in the other case, and that's what we have to try to organize...", explained an information systems security manager from an industrial group interviewed in 2024.
Organizing information systems security involves a number of challenges: defining the broad outlines and principles to be respected within an organization.
This can be seen, for example, in the form of essential principles, the most important of which is undoubtedly never to forget that security is first and foremost a matter for the players in the system. But stating principles is not enough, we also need to say what consequences should be drawn from them in organizational terms: loss of reputation, degradation of service quality linked to IS interruption, associated financial losses, regulatory sanctions for non-compliance with Article 32 of the RGPD (General Data Protection Regulation) providing for the securing of personal data processing, for example.
ISS from the point of view of the link between technology and organization, because technical resources and security are not an end in themselves, but serve security objectives defined within a dedicated ICT risk management framework. It is up to the company to define its priorities for dealing with ICT/digital risks, and to define the allocation of detection, prevention and response resources to priority risks. By way of illustration, when faced with the risk of external intrusion, sometimes referred to as a cyber attack, the resources deployed will consist of both technical and organizational solutions, as well as solutions that focus on the human factor.
Technical solutions may include the installation of the latest generation of anti-virus software (EDR), the installation of...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
KEYWORDS
governance | risk | information security | security policy | ISS
EDITIONS
Other editions of this article are available:
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Organization of the company's SSI
Bibliography
Standards and regulations
- Management de la sécurité du système d'information - ISO 27001 -
- Mesure de la sécurité du système d'information - ISO 27002 -
- gestion des risques liés à la sécurité de l'information - ISO 27005 -
- Lead Cybersecurity Management - ISO 27032 -
- Sécurité des applications - ISO 27034 -
- Gestion des incidents de sécurité de l'information - ISO 27035 -
- Management de...
Directory
Organizations – Federations – Associations (non-exhaustive list)
ANSSI – French Information Systems Security Agency
CESIN – Club of information and digital security experts
...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference