Anyway, although many new rules are appearing, the current tendency [7] to face
an ISMS consists of homogenizing some of its basic aspects such as maturity models
and best practices guides into a stable set that let us face each particular case with the
ISMS model that better adapts to it.
As a core of the new security orientation as a management system, security
policies containing sets of rules and regulations to determine how an organization
must protect itself have been created [8]. Thus, Cabrera Martin [9] puts forward that
the way to planify security within an organization must always start from the
definition of a Security Policy that determines the organization’s objectives in the
security field and from this determination, we could decide through an adequate
implementation plan how the fixed objectives will be reached.
Before starting a project for implementing an information security management
system within an enterprise, it is necessary to determine the level of the Information
Security Governance of the company since the absence of it guarantees the failure of
the security management. It is not viable to start implementing a security management
system with the absence of a stable and defined information security governance.
[10]. The following step for the implementation of an ISMS is to establish the security
maturity level of the enterprise and to where it should evolve although these maturity
levels can be established in different ways. Thus, Von Solms [11] defines security as
a discipline of multiple dimensions that must be covered to obtain a security plan,
through an incremental certification of security, and for Von Solms, the most
important phase of the plan is to determine the maturity level of the company ISMS
and compare that level to the losses that it can cause to the business. The maturity
model that we propose states an evolution of the maturity levels similar in some
aspects to that stated by Von Solms, in a way that enterprises will be able to certify
themselves in the different levels of the maturity model. This will let them face
projects with a shorter temporary vision as well as analyse the results of the plan
earlier.
Nowadays, it is very complex for a small or medium size enterprise to face the
implementation of a security management system. Concerning security, the
enterprises’ tendency is to slowly migrate their culture to the creation of an ISMS,
although this progression is very slow in such a way that René Sant-Germain [3]
estimates that with the current models, in 2009, only a 35% of the enterprises with
more than 2000 employees in the world will have an ISMS implemented and figures
regarding small and medium size enterprises will be much worse.
The majority of enterprises have found many problems at the time of
implementing systems such as BS7799 certification and UNE71502 since they are
total certifications and this avoids that enterprises have intermediate points to focus
the reach of their objectives. It also avoids that system departments obtain
intermediate success that allow them to obtain the support of the Direction Board. The
maturity model that we state allows us to obtain intermediate certification, being able
to face each maturity level in 1 or 2 years periods instead of the 3 to 6 years that are
currently needed in a medium size enterprise. Audit, certification and accreditation of
the management system is important to provide the security environment, customers
and providers with credibility. For this reason, our proposed maturity model is based
on the certification by levels instead of an only total certification. Our maturity level
proposes to divide UNE71502 certification and ISO27001 into three certification
levels [1 to 3], each one having a subset of controls extracted from ISO17799.
257