The Security Role Cluster plays an important role in nearly all IT activities, especially in e-business. An information system with a weak security foundation eventually will experience a security breach. Depending on the information system and the severity of the breach, the results could vary from embarrassment, to loss of data, to loss of revenue, to loss of life.

The primary goals of the Security Role Cluster are to ensure:

  • Data confidentiality - No one should be able to view data if not authorized.
  • Data integrity - All authorized users should feel confident that the data presented to them is accurate and not improperly modified.
  • Data availability - Authorized users should be able to access the data they need, when they need it.

Security specialists in this role focus not only on the technical intricacies of protecting the corporate network, but on the business policies and practices for such things as company e-mail, remote access usage, permissions on sensitive corporate financial and human resource data, and issues as specific as maintaining the confidentiality of the organization's employee phone listing.

Information security architecture bridges the gap between platform-specific security measures and corporate business process and policy directives. One example of security's role in business processes is defining and implementing exit procedures for employees leaving the company. When an employee leaves the company, the risk to the corporation is especially high and in need of managing, especially when a company's business is intellectual property, which is more difficult to track.

The Security Role Cluster contributes to both enterprise IT and business unit IT activities. This role cluster is also integral in working with the Infrastructure Role Cluster in evaluating security-related system and automation tools such as third-party intrusion-detection systems.

Another responsibility of the Security Role Cluster is creation of a comprehensive plan for the audit, retention, classification, and secure disposal of data. Legal, financial, and historical data needs to be safely stored for appropriate periods of time as defined by law, the industry, and the organization. This requires implementing an efficient backup and retrieval process in the operations role. Noncritical data should be disposed of to minimize storage costs. Physical security, as it relates to data, assures secure telephone and data connections and physical access to assets, as well as secure connections to business partners, joint ventures, and new acquisitions. Exposures related to weak physical security allow easy access to intruders. For related risk management information and guidance, please review the MOF Risk Management Discipline for Operations document, which is available at Microsoft Operations Framework (MOF).

Responsibilities

Key responsibilities of the Security Role Cluster include:

  • Helping to monitor the correct operations of IT resources.
  • Detecting intrusions and protecting against viruses.
  • Providing denial-of-service protection.
  • Defining policies for data retention and secure data disposal.
  • Performing audit tracking and reporting.
  • Providing effective network domain security design and management.
  • Testing and implementing strategic security technology.
  • Monitoring and assessing network vulnerability.
  • Providing fast, real-time network intrusion response.
  • Managing Public Key Infrastructure (PKI) technology requirements.
  • Managing Internet Protocol (IP) security requirements.
  • Managing authentication and access methods requirements.
  • Managing user-policy usage and requirements (such as a password policy).
  • Managing external and physical security requirements (such as access to computer rooms).
  • Managing secure messaging requirements.
  • Providing ongoing technical support and subject matter expertise for security initiatives within the company.

Competencies

Key skills required of the Security Role Cluster include:

  • Understanding of security policies and ability to review them for completeness.
  • Understanding of business areas and the type of data they deal with in order to improve security.
  • Ability to set up shared areas on various servers.
  • In-depth understanding of the security model of the company's operating platforms.
  • Extensive knowledge of networking. Understanding of viruses and antivirus methods.
  • Ability to balance security issues against productivity issues to ensure that neither is lowered greatly by security policies.
  • Ability to set up security profiles for different groups of users.
  • Ability to educate and inform employees about security procedures.
  • Ability to work and consult with other IT groups when security questions arise.
  • Understanding of the methods of securing data and files, such as authentication and encryption, and products that enable and improve these methods.
  • Ability to work with vendors offering security solutions in order to evaluate product offerings.
  • Ability to monitor security risks, such as outgoing employees, to help maintain security.
  • Ability to conduct security audits.