Example of Security Management System of the Organization – Components and Concepts

Example of Security Management System of the Organization – Components and Concepts

INTERNATIONAL SCIENTIFIC JOURNAL "SCIENCE. BUSINESS. SOCIETY" WEB ISSN 2534-8485; PRINT ISSN 2367-8380 EXAMPLE OF SECURITY MANAGEMENT SYSTEM OF THE ORGANIZATION – COMPONENTS AND CONCEPTS ПРИМЕР НА СИСТЕМА ЗА УПРАВЛЕНИЕ НА СИГУРНОСТТА НА ОРГАНИЗАЦИЯТА – КОМПОНЕНТИ И КОНЦЕПИИ Dr. Eng. Dimitrov D.L., Dr. Eng. Panevski V.S., Nikolov G.M. Institute of Metal Science Equipment and Technologies “Acad. A Balevski” with Hydroaerodynamics Centre - Bulgarian Academy of Sciences, Sofia, Bulgaria E-mail: [email protected]; [email protected]; [email protected] Abstract: Issues related to security are intertwined in all areas of the life of an organization. Many of them are considered and documented organizational and provided within the respective area/subsystem of the management system of the organization. For example, information security management is detailed and reliably described in the international standards. And this is natural, considering the importance of this type of security and the fact that information technology lie at the core of almost all organizations. In the meantime however, it is necessary to go a long way to reach the ultimate goal of improving security of the organizations by developing integrated management systems for business security. A Security Management System may be considered as that part of the overall management system, based manly of the quality management system, that provides the structure to enable identification of potential threats to an organization and which establishes, implements, operates, monitors, reviews and maintains all appropriate measures to provide assurance of the effective management of the associated security risks. KEYWORDS: QUALITY; QUALITY MANAGEMENT SYSTEM (QMS); SECURITY; SECURITY MANAGEMENT SYSTEM (SMS); INTEGRATED MANAGEMENT SYSTEMS FOR BUSINESS SECURITY; SECURITY RISKS. 1. Introduction essential that those with responsibility for security are able to demonstrate competence not only in all aspects of the security Successful companies have found a way to offer something that discipline, but also have an awareness of the contribution security people want, at a price they are willing pay, in a way that will make can make to other aspects of the business, such as Governance, money in the transactions. Highly successful companies offer Strategy, Compliance, Assurance, New Ventures, and other quality products and services in this exchange, and keep quality essential business-related issues. It is the responsibility of the high; so that the customer will return the next time he/she wants to person with overall responsibility for Security to ensure that purchase [1]. training and development needs arc recognized, addressed and records maintained. In this way, security may become an integrated Quality has been defined as “The totality of features and and respected part of the organization; used in business planning, characteristics of a product or service that bear on its ability to execution, and decision making. Expectations of security personnel satisfy stated or implied needs. Not to be mistaken for “degree of are: excellence” or “fitness for use” which meet only part of the definition”. By this definition, security is a component of quality. • Professionalism - living the corporate values; Security is defined by the American Heritage Dictionary in their • Expertise - demonstrating a thorough knowledge of the subject; on-line database as: • Vision - demonstrating an understanding of the wider business a) Freedom from risk or danger, safety; objectives; b) Freedom from doubt, anxiety or fear; confidence; • Teamwork - working closely with other disciplines to understand their contributions and aspirations; c) Something that gives or assures safety as: • Collaboration - conducting security risk assessments in support of - a group or department of private guards; specific operations, not in isolation; - measures adopted by a government to prevent espionage, • Communication - security considerations to top management in a sabotage or attack; clear, concise manner, demonstrating due consideration to all - measures adopted, as by a business or homeowner, to factors. prevent a crime such as burglar or assault. Component 2 - Policies, Objectives and Tasks These definitions, taken together, can demonstrate that quality There should exist а single security policy which outlines the is the responsibility of the whole organization and security is a part security architecture, strategy and protocols. of the totality of quality of a system, implicit in customers` expectations. Security, as a component of quality, must be The following sections are addressed: addressed throughout an organization, in the definition of strategy, • Security management objectives; the development of policy and the implementation and monitoring of both [2]. • Statement of the attitude of the organization to security; 2. Components of security management system - • Description of the security environment; discussion • Statement of the security risk appetite; Component 1 – Credibility and Integration of the Personnel • Security organization, roles and responsibilities; A prerequisite that corporate security personnel come, for example, • Procedures for security risk assessment; from military, intelligence or law enforcement background, it is • List of security Standing Operating Procedures (SOPs); 37 YEAR I, ISSUE 4, P.P. 37-40 (2016) INTERNATIONAL SCIENTIFIC JOURNAL "SCIENCE. BUSINESS. SOCIETY" WEB ISSN 2534-8485; PRINT ISSN 2367-8380 • Security priorities and calendar for coming year. • How much does it cost? Component 3 - Threat, Vulnerability and Security Risk • What is our back up if something doesn't work or isn't Assessment available? Security risk assessments should take into consideration a wide Component 7 - Execution and Control Activities range of elements beyond physical security threats. Such elements should include: The execution of a plan is predicated on all of the previous components in the management system: • The operating environment and groups/events by which it is characterized; • The plan has identified all the security risks to the operation; • The profile of the organization, the footprint and the social impact; • All control mechanisms are established; • The strategic, long term objectives of the organization; • The plan has been accordingly and appropriately resourced; • Voluntary Principles of Security and Human Rights; • Any bespoke procedures are documented, approved and validated; • Legislation and local expectations; • The plan has been effectively communicated to those with • Capability and intent of local criminal/terrorist elements; responsibility for its execution; • Vulnerability and attractiveness of assets to criminal/terrorist • Assurance that those with responsibility for carrying out the elements; plan have the correct competencies; • Availability of resources. • All correct back up and reinforcement strategies are established and tested. Component 4 – Controls Component 8 - Monitor and Security Reporting Examples of security controls may include: Monitoring is based, upon effective two-way communication. • Physical protection measures (lights, fences, CCTV, barriers, Where appropriate, traditional methods are often effective and etc.); should be considered: • Introduction of security procedures (ID checking, access • Inspections; control, mail screening, etc.); • Review meetings; • Intelligence networking (local social/political leaders/intelligence providers, etc.); • Auditing; • Electronic security (encryption, password protection, etc.); • Interviews; • Resourcing (security personnel, equipment, etc.); • Workshops. • Local integration (CSR programme, local content, etc.;) Component 9 – Review Component 5 - Security Risk Register The purpose of the review may be any combination of the following: A security risk register should: • To critically debrief the plan in order to determine strengths • Facilitate ownership and management of security risks; weaknesses and areas that could be improved; • Provide an overview of the significant security risks that arc • To obtain feedback from those involved in the execution of faced by an organization; the plan/ project regarding the manageability of the plan; • Record the results of threat/vulnerability security risk • To highlight any competency issues arising from exposure to assessment; new challenges; • Form an agreed record of those security risks that have been • To examine how much contribution the operation/task/project identified; brings to the achievement of the organization's objectives; • Record additional proposed actions to improve the security • Assurance to top management that security is being managed profile; effectively; • Facilitate the prioritization of security risks. • Enables security management to assess whether established Component 6 - Planning and Resourcing protocols are being effective, and to take action accordingly; Effective planning will answer: • Highlight examples of good practice. • What are we going to do? Component 10 – Learning • How are we going to do it? Effective processes for learning lessons will enable an organization to: • When are we going to do it? • Introduce improvements to procedures; • How long do we need to do it for? • Introduce improvements in organizational structure; • How are we going to coordinate and communicate? • Update documentation; • What do we do if something goes wrong? • Implement of new training courses; Effective resourcing will answer: • Increase awareness

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    4 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us