54with ISO 27001 – defining and communicating roles and responsibilities is also required to achieve certification.
Five Typical Roles and Responsibilities While the specific naming and place on the organizational chart may vary – all security programs have at least five role types. These role types area minimum requirement for any security program and a requirement to fulfill the requirements outlined in clauses 4-10 of ISO 27001.
1. Security Leadership The defined leader of an information security program varies widely dependent upon organization shape and size. In some small organizations security leadership maybe shared with members of other departments such as information technology,
engineering, or legal. In more mature organizations the security leader maybe a Chief Information Security Officer (CISO), VP, or Director level security practitioner. In either case, security leadership must own the information security program (including formalized responsibility and authority. Typical duties include
• Defining the context of the security program including aligning the program to business objectives and ensuring appropriate stakeholders
have been considered • Setting the strategic objective, building the security program road-map, allocating
budget and human resources • Developing, tracking, and reporting security KPIs to relevant stakeholders (e.g.,
Customers, Leadership, the Board of Directors)