Master plan is the ‘end state’ Security Manager wants to reach with respect to all desired improvements & upgrades are complete/full-filled, Security is best-in class, best-fit and “perfect” in today’s risk scenarios. The definition of "best-fit Security" is very simple, which is sufficient and logical to balance all credible risks (its a myth).
But as we know risks are dynamic, changing with time, reshaping and threat-actors are innovating & instituting new ways to attack, therefore “Master Plan” cannot be static. Reaching perfection is a mirage, achieving or completing master plan will never appear possible. Adversary, the bad guy will always find new path to breach, one time made & achieved master plan cannot prevent such innovated risks.
So the queries arises, why we need a master plan? how to make it? How to manage master plan? The blog aimed to explain the experience of drafting, practice implementation of master plan.
Size of facility or assets to protect do not impact the need of having Security’s master plan. Only components in the master plan varies. There are various reasons Security Manager or Security team need to have a master plan, if made wisely and sensibly the master plan acts like a guiding star. However it is not the 1st step as far as documentation for Security is concern. The opening move must be “risk assessment”, unless we don’t know, quantify, and measure the risks, we cannot plan what to do for Risk mitigation. Important part of 1st step risk assessment is Management should approve the risk list and concur regarding cost of risk getting real. Don't expect management do risk estimation, it is role of multi-skilled team to contribute with primary responsibility lies with Security.
Once
risk AND cost of not managing the risks is known, master plan is to be made considering
Security components status as below:
What
is in hand – that can be carried forward? …..
no cost is required.
What
is in hand – that need to upgrade? …… less cost is required.
What
is in hand – that need to be replaced? ….. cost is required.
What
is not there, but required to mitigate the risk? ….. cost is required.
Master
plan plays an important role in approving the budget for Security expenditure.
Work done by the Security manager in risk assessment and quantification, pays
back here.
As management knows loss value due to risk getting real, approving budget for risk treatment become easy as master plan gives bigger picture. This gives assurance to Management that big picture is seen by Security Manager before approaching for Capex/Opex approvals for Security.
Please remember, one component alone cannot cover risk fully, it is multiple components coming together help reducing some part of risk. So, challenge for security manager will be to keep cost assessment ready for all components and move step by step with priority list to implement the master plan component. This priority list also enable Management and Security Manager to identify the quick-wins.
How to
make Master plan?
Master
plan is high level summary can be represented as chart or a list showing the
following:
a).
Components needed for mitigating the risk within 5 Security layers. Refer the
list of each component.
b).
Status of each component – this can be done by color coding, indicating as is component,
which is good to carried forward in future, what is required upgrade, what is
required to be added.
c).
Priority scoring of each missing component or even may be for components required
to be upgraded. This will comes from Risk assessment exercise. Once risk quantification is done WRT as is scenarios and upgrades required (i.e. Security components to be added), we will get in how many risk scenarios missing Security component is adding value in reducing risk rating. The existing systems which only requires upgrades, are easy rewards.
d).
Integration and relation between each Security component – this is important to
know which can be or cannot be implemented, dependency with other component.
E.g. isolating e-Access control with video surveillance for large scale setup.
e). Integration with non-Security components. This is generally the missed part while Security plan is drafted, very common mistake of taking Security along in risk mitigation. E.g. people data from Human Resource system to Identity and access management system and returning access in & out data to be used for Safety head count or attendance.
Once
the successful risk assessment is completed, identify the components which are
missing. Risk assessment should also give the priority of each missing component.
It is important to keep it confidential document as it gives clear picture of
weakness in the Security Operations. As the approvals are in place and components
are implemented with time, Security Manager should review the master plan every
time risk assessment is carried out.
Excellent blog Smit... this is quite organic and informative with realistic & practical inputs. Continue generating such contents to educate this very fraternity.!!
ReplyDelete