Volume 3, July 2013 In This Issue: • • • • • Why, When and How to Migrate to COBIT 5 COBIT 5 for Assurance Available Now Risk Assessment Management Using COBIT 5 Top 5 Reasons COBIT 5 Training Is Critical Evidence Management for the COBIT 5 Assessment Programme Come join the discussion! Sudarsan Jayaraman will respond to questions in the discussion area of the COBIT 5—Use It Effectively topic beginning 22 July 2013. Why, When and How to Migrate to COBIT 5 By Sudarsan Jayaraman, CISA, CISM, BS 25999 LA, COBIT (F), ITIL V3 Expert, ISO 20000 LA, ISO 27001 LA, ISO 9001 LA ® With the release of COBIT 5, a new evolution in the thinking process of managing and governing IT has taken shape. The question to answer is whether organizations that have invested in the implementation of the earlier versions of COBIT have to migrate to COBIT 5. If yes, the question becomes: why, when and how does an organization migrate to the new framework? Migrating to COBIT 5 is not the same as migration of software or hardware or a platform. Instead, this should be considered as a transition of the way work is done to meet the requirements of stakeholders. That said, was this not being done in the ® earlier versions of COBIT? That is, how different is COBIT 5 from COBIT 4.1 and what are the benefits an organization can realize from this new release? Call for Articles How are you using COBIT® at your enterprise? We welcome articles on your experiences with this framework. Deadline to submit copy for volume 4, 2013: 4 September 2013 Submit articles for peer review to: publication@isaca.org Why Migrate to COBIT 5? COBIT 4.1, while a popular framework, is considered by many to be an IT framework, not an enterprise framework. COBIT 4.1 addresses the IT requirement more as an operation model and a good practice guideline related to IT processes. After going through COBIT 5, one may get a feeling that COBIT 4.1 was lacking the governance view toward the organization and was more process-oriented. However, COBIT 4.1 does bring in the view of business-IT alignment by way of mapping enterprise goals with IT goals and finally with the IT process goals. COBIT 5 has further built on the process model and has clearly demarcated the governance and management processes separately. A new governance domain is introduced as a part of the COBIT 5 process reference model; this is a major improvement that provides clarity on the management and governance functions within an organization. A major improvement in COBIT 5 is the introduction of the five key principles and Case Studies Visit the COBIT Recognition and Case Studies pages to read more COBIT 5 and COBIT 4.1 case studies. seven enablers, which form the pillar of the framework. With these additions, COBIT 5 has aligned itself closely with the ISO 38500 framework. Research Update COBIT 5 has retained the goal cascading model of COBIT 4.1; however, it has gone further by including the stakeholder needs as the starting point of the mapping, which then cascades to enterprise goals, IT goals and finally to enabler goals. Recently Released COBIT 5 Materials The other key difference to point out is that a new process assessment model (PAM) has been introduced. The COBIT PAM is aligned with the ISO 15504 standards requirement. This means more stringent and accurate assessment of the relevant processes. In brief, the key benefits of COBIT 5 for enterprises can be summarized as follows: • Aligning business and IT more closely by taking into account the stakeholder needs as the starting point. This provides more business focus with due consideration of internal and external stakeholders’ needs. • Introducing the seven enablers as a more efficient and effective way of using resources to meet business requirements • Showing the entire organization as responsible for governance of IT through the holistic inclusion of enhanced role descriptions in the RACI chart • Helping the organization to understand business perspective more clearly by mapping the goals and objectives to a business scorecard model • • Upcoming Third Quarter 2013 COBIT 5 Releases • • • • • Thus, for organizations that have implemented COBIT 4.1, migrating to the new framework is a natural process of progression under which the organization will extend its coverage of IT governance to an enterprisewide governance initiative. When to Migrate to COBIT 5? At this current age of economic stagnation, is it wise to reinvest and migrate to the COBIT 5 framework? When is the right time to consider migration to COBIT 5? There is no single answer to this question. However, if the organization is still in the process of completing the COBIT 4.1 process implementation, it is advisable to continue the implementation before considering a migration to the new framework since any COBIT 4.1 implementation would have been typically initiated to respond to business requirements for improvements or to address specific pain points encountered by the organization. Since the respective controls to treat such issues would have been identified from the earlier version of COBIT, it is better to continue implementation and monitor whether the key goals are being accomplished, before migrating to COBIT 5. If the organization has implemented most of the COBIT 4.1 controls and has reached what it believes to be a reasonable degree of maturity, it is time to consider migration to COBIT 5, as COBIT 5 brings in the key differentiating aspect of segregating governance from management, which is important to consider and is a new addition with COBIT 5. Also, when using COBIT 5, the IT governance setup, which had been typically more inward-focused, will transition into the model of governance of enterprise IT (GEIT), in which involvement of enterprise stakeholders plays an imperative role. The following is a list of triggers that would suggest it is time to migrate to COBIT 5: • Repeated failure of critical IT process results in issues related to the delivery of committed services by the business. • Risk to the business has not been reduced considerably and IT risk does not align to enterprise risk. • Controls implemented are more IT-oriented and do not span the enterprise. Volume 3, July 2013 COBIT® 5 for Assurance COBIT 5 Implementation Training and Certificate • COBIT® 5: Enabling Information COBIT® 5 for Risk COBIT/COSO white paper COBIT 5 Assessor Training and Certificate COBIT Certified Assessor Additional COBIT 5 Initiatives in Development COBIT® 5 Online: - Access to publications in the COBIT 5 product family (tentative release fourth quarter 2013) - Access to other nonCOBIT ISACA content and current, relevant GEIT material (tentative release first quarter 2014) - Ability to customize COBIT with multiple-user access (tentative release third quarter 2014) For more information on COBIT publications and training, visit the COBIT 5 page of the ISACA web site. COBIT 5 translations are available on the COBIT Product Family page. Page 2 Figure 1—Pain Points and COBIT 5 Mitigations Pain Areas Target Processes Pain Areas Target Processes Failed Projects BAI01 Manage Programs and Projects End-user Responsibilities APO09 Manage Service Agreements Ad hoc Initiatives/ Planning APO01 and APO02 IT Mgmt. Framework and Strategy Support From Suppliers APO10 Manage Suppliers Communication Within IT Division APO09 Manage Service Agreements Lack of Automation Tools BAI02 and BAI03 Requirements Definition and Solutions Identification Management Reporting MEA01 and MEA02 Performance and Internal Control Accountability Among IT Staff APO09 Manage Service Agreements (OLAs) There are other pain triggers that may lead to migration to COBIT 5. Figure 1 provides an overview of pain points and typical COBIT 5 processes that can be used to mitigate the issue. How to Initiate Migration? Before initiating a migration to the new framework, it is recommended to clearly set the objective of migration. That is, what are the business benefits the organization will achieve by adopting the new framework? If a tangible and measurable goal is set as the baseline, achievement can be measured and success of adoption can be demonstrated. The key to a successful migration is to commence the activity by addressing the key pain areas within the organization. Once the pain areas are identified, the following steps can be followed: • Initiate an assessment to identify the status and maturity of the processes that are currently implemented, if any. • Prepare a migration strategy by identifying the processes and the required enablers from COBIT 5 to be implemented. • Identify the affected departments, section and services that will be impacted by this migration. • Ensure that a project management plan with time lines is created and a budget is allocated for this effort. • Remember to run the migration activity through the change management process. • Address the organization change impact that will be created by this migration and have a transitional plan to roll out the migration. • Market and communicate the positive impact that will be achieved by this migration to get buy-in from top management. Once the above initial steps are performed, the organization is ready to commence the journey. It is recommended to break the entire migration into smaller scope areas that are manageable, because quick wins will motivate the migration team and the organization to continue the journey. Sudarsan Jayaraman, CISA, CISM, BS 25999 LA, COBIT (F), ITIL V3 Expert, ISO 20000 LA, ISO 27001 LA, ISO 9001 LA Is a director of technology risk services at Protiviti Member Firm (Middle East). He has more than 20 years of experience in IT advisory and consultancy services, focusing predominately in IT governance, IT service management and information security management. Jayaraman has successfully managed and facilitated ISO 27001 and ISO 20000 certification at a number of large and prestigious companies in the Middle East. Volume 3, July 2013 Page 3 COBIT 5 for Assurance Available Now By Anthony Noble, CISA ® COBIT 5 provides a comprehensive framework that assists enterprises in achieving their objectives for the governance and management of enterprise IT (GEIT). Simply stated, it helps enterprises to create optimal value from IT by maintaining a balance between realizing benefits and optimizing risk levels and resource use. COBIT 5 enables IT to be governed and managed in a holistic manner for the entire enterprise, taking into account the full end-to-end business and IT functional areas of responsibility, considering the IT-related interests of internal and external stakeholders. ® COBIT 5 for Assurance builds on the COBIT 5 framework. Focused on assurance, it provides more detailed and practical guidance for assurance professionals and other interested parties at all levels of the enterprise on how to use COBIT 5 to support a variety of IT assurance activities. If an enterprise is already using COBIT 5 as its framework for the governance and management of enterprise IT, COBIT 5 for Assurance enables the enterprise to leverage COBIT 5 when planning and performing assurance reviews, so that the business, IT and assurance professionals are aligned around a common framework and common objectives. However, the enterprise does not have to be currently using COBIT 5 to use COBIT 5 for Assurance. The main drivers for assurance include: • Providing interested parties substantiated opinions on GEIT according to agreed-upon assurance objectives • Defining assurance objectives in line with enterprise objectives, thus maximizing the value of assurance initiatives • Satisfying regulatory or contractual requirements for enterprises to provide assurance over their IT arrangements Assurance means that, pursuant to an accountability relationship among two or more parties, an IT audit or assurance professional may be engaged to issue written communication expressing a conclusion about the subject matter to the accountable party or another interested party. Assurance refers to a number of related activities designed to provide the reader or user of the report with a level of assurance or comfort over the subject matter. For example, assurance engagements could include support for audited financial statements; assessment of value provided by IT to the enterprise; reviews of controls; compliance with required standards and practices; and compliance with agreements, licenses, legislation and regulations. An assurance initiative consists of five components, as illustrated in figure 1. Figure 1—Assurance Components Source: ISACA, COBIT 5 for Assurance, USA, 2013, p. 15 Volume 3, July 2013 Page 4 Subject matter is the specific information, practices or controls (e.g., any of the seven COBIT 5 enablers) that are the subject of an audit or assurance professional’s review, examination and report. This subject matter can include the design or operation of internal controls and management practices over any aspect of the enterprise, or compliance with privacy practices, standards, or specified laws and regulations. Criteria are the standards and benchmarks (e.g., COBIT 5) used to measure and present the subject matter and against which the practitioner evaluates the subject matter. Criteria can be formal or less formal. There can be different criteria for the same subject matter. Suitable criteria are required for reasonably consistent evaluation or measurement of a subject matter within the context of professional judgment. Suitable criteria must have the necessary goal attributes as defined in the COBIT 5 Information model—objectivity, measurability, understandability, completeness and relevance. When undertaking an assurance activity, the assurance professional executes the assignment by following a structured approach, dependent on other enablers, to reach a conclusion on the evaluation of the subject matter. The process of evaluating the results of audit or assurance testing, after confirmation, to arrive at conclusions and recommendations can be complex. What appears to be a problem may, in fact, be the effect of a problem, not the cause. Therefore, it is important for the assurance professional to follow the conclusion process—from confirming facts with key individuals in the areas being audited to determining root causes. The individual findings can then be used to provide examples that support higher-level analysis: • Developing various scenarios leading to potential recommendations • Selecting an appropriate recommendation that is practical and achievable • Identifying steps necessary to ensure the buy-in of key stakeholders Indeed, audit and assurance professionals should obtain an adequate understanding of the subject matter and its business environment. They should see the bigger picture, link the impact of the issues/findings to the overall organizational strategic goals and objectives to tell the story behind the story, and communicate valuable insights. Executives are not very interested in knowing the observations; they need to understand the insights behind the findings. The basics of a generic assurance process include the four components described here. That is, it defines a scope relating to the subject matter, it sets suitable criteria based on a sound reference model, it executes the assignment and then it issues a conclusion to the user. To address the assurance drivers, COBIT 5 for Assurance: • Provides guidance on how to use the COBIT 5 framework to establish and sustain assurance provisioning and an assurance function for the enterprise • Provides a structured approach on how to provide assurance over enablers (all of COBIT 5’s defined enablers, e.g., processes, information, organizational structures) • Illustrates the structured approach with a number of concrete examples of audit/assurance programs A major benefit of COBIT 5 for Assurance is that users can rely on the consistency, structure, context and vocabulary of the COBIT 5 framework and its related products. The COBIT 5 framework addresses GEIT, helping to align business and IT management and providing a basis for improving IT performance. If assurance professionals base their reviews on the same framework as that used by business and IT managers who are improving value of IT for the enterprise, everyone involved will be using a common language, and it will be easier to agree on and implement control improvements as necessary. This guide can be used by assurance professionals for many different purposes, including: • Obtaining a view (based on COBIT 5 concepts such as the enablers) on current good practices of assurance • Learning how to use different COBIT 5 components and related concepts for planning, scoping, executing and reporting on various types of IT assurance initiatives • Obtaining a view of the extent to which the value objective of the enterprise—delivering benefits while optimizing risk and resource use—is achieved The target audience for COBIT 5 for Assurance is broad and includes: • Assurance professionals at various governance and management levels • Boards and audit committees, as stakeholders who commission assurance activities • Business and IT management, as responsible parties • External stakeholders, including external auditors, regulators and customers Volume 3, July 2013 Page 5 Although this guide is aimed primarily at assurance professionals, it may also be of interest to IT professionals and advisors. COBIT 5 for Assurance may be most useful to experienced professionals, as it is not intended to provide a tutorial on IT assurance. Anthony Noble, CISA Is the New York-based vice president of IT audit for Viacom Inc. He has 30-plus years of IT experience and 20 years of experience as an IT auditor. He is a member of ISACA’s Knowledge Board and was the chair of the COBIT 5 for Assurance Guide Task Force. Come join the discussion! Vince Londini will respond to questions in the discussion area of the COBIT 5—Use It Effectively topic beginning 22 July 2013. Risk Assessment Management Using COBIT 5 By Vince Londini, CSPO As a regional US grocery chain based in a major metropolitan area, FamilyGrocer (name changed) had experienced rapid growth through new store openings and acquisitions. With a focus on supply-chain efficiencies, FamilyGrocer distributes most products to its stores through a warehouse facility that also houses key offices and IT resources. In light of the risk associated with such a consolidated operation, the IT organization received a mandate from its board of directors to formally manage ITrelated risk. The mandate specifically called for an initial high-level assessment of IT organizational risk, drawing largely from internal expertise. The board also requested that the IT organization demonstrate an ongoing program to manage risk. The IT organization enjoyed a membership with Info-Tech Research group to access its best-practices research and vendorselection guidance. Engaging with Info-Tech to conduct a COBIT-based operations workshop on risk management was a natural next step. ® Info-Tech based the workshop on COBIT 5 because of COBIT 5’s clear and concise framework for capturing key IT processes (along with process interplay and documentation requirements). COBIT is a trusted framework used by IT auditors and other IT professionals, particularly in the strategy, security and risk areas of practice. Throughout the week-long workshop, key members of the IT management team, as well as the chief information officer (CIO), worked with the facilitator to document their insights and understanding, using COBIT to draw out their knowledge of IT risk and arrange it in a manner suitable for analysis. The risk assessment began by examining COBIT 5’s EDM03 and APO12 management practices, from the Evaluate, Direct and Monitor (EDM) and Align, Plan and Organize (APO) COBIT domains, respectively, and conducting a simple selfassessment to ascertain process capability. The IT organization identified that it had no functioning IT risk management processes in place and, thus, assigned level zero to its process capability. The team set a goal to achieve level two (managed process) capability with performance and work-product management attributes achieved. The IT organization leveraged the Info-Tech facilitator and methodology to conduct high-level team brainstorming with key team members, aimed at identifying IT risk factors relevant to the client organization. The team then dug in to brainstorm and document risk events, identifying actors and threat type. A prioritization rubric was developed and applied to sort the risk events. The team documented (where programs were in progress) or identified (netnew programs) the resources/time needed to mitigate the priority risk factors. Finally, the team made critical decisions to determine the shape of the IT organization’s ongoing risk management. These included definitions of roles and responsibilities, management activities, information-gathering activities, and communication plans. As the decisions were achieved, each was codified in the relevant program manuals, standard operating procedures, assessment tools, project requests, and templates for policies and communication. Volume 3, July 2013 Page 6 The key outputs from this workshop included: 1. A catalog of IT risk events—As described previously, this catalog not only documented risk events but also the highlevel mitigation strategies, initiating IT project requests as needed for items not already on their project calendar. 2. An IT risk management program guide—This document captured critical decisions, including the team’s rubrics for assessing risk event severity and risk event likelihood. The document described the ongoing IT risk management steering committee process to which the team committed during the workshop. 3. A presentation to the firm’s board on the IT risk management assessment and program—This presentation described the progress made during the workshop, highlighted key risk factors and remediation, requested additional budget, and summarized the ongoing risk management program to the board. FamilyGrocer emerged from the workshop with all of the process documentation required to begin executing the process the following Monday, along with the relevant to-do items needed to mitigate the identified technology, people and process gaps. The following week, the CIO presented the workshop summary to the board, which noted the thoroughness of the initial IT risk assessment and the ongoing risk management program that was designed during the workshop. Two months later, progress toward risk remediation remains strong, and IT leaders remain committed to the ongoing risk management program. Vince Londini, CSPO Serves as practice leader with Info-Tech Research Group. His recent work includes applying Info-Tech’s COBIT-based workshop methodologies to help clients in the US and Canada improve their IT risk management, project portfolio management, change management and service desk processes. Top 5 Reasons COBIT 5 Training Is Critical By Mark Thomas ® When organizations are looking to adopt COBIT 5, many questions arise. Does the enterprise fully understand what governance and management of enterprise IT (GEIT) means? Do the enterprise’s IT governance professionals know how to effectively assess the current state of enterprise IT with the objective of scoping what aspects of COBIT 5 to implement? Is the enterprise able to complete an assessment to determine the capability of a defined process? COBIT 5 training is an important component in ensuring IT governance professionals have the answers to these questions and are becoming skilled, competent and proficient COBIT professionals. While many concepts may be familiar to those who are in the IT space, this evolutionary version incorporates the latest thinking in enterprise governance and management techniques, and provides globally accepted principles, practices, analytical tools and models. The need for a proper training program for IT and business professionals on what COBIT is and how it can be used and implemented is critical. COBIT training is intended for business management, chief executives, IT/IS auditors, internal auditors, information security and IT practitioners, consultants, and members of IT/IS management who are looking to gain insight into GEIT. Key Benefits to COBIT 5 Training Investing in COBIT 5 training is beneficial for the individual as well as for the enterprise. The key benefits include: 1. Increased efficiencies and productivity—COBIT 5 training courses provide the tools and knowledge that are essential for the successful use of COBIT. By applying what they learn during the course, professionals will better understand what GEIT means and how it may be applied to their enterprise. In addition, each individual will have a more practical appreciation of how to apply COBIT 5 to specific business problems, pain points, trigger events and risk scenarios. As a result, the individual’s roles and responsibilities within the organization as they relate to COBIT will be clearly defined, resulting in increased productivity and efficiencies in the enterprise. 2. Building trust in and value from information systems—COBIT 5 training courses provide individuals with the key concepts and principles so that they can begin to uncover how they will need to assess the current state of their enterprise IT, with the objective of scoping what aspects of COBIT 5 would be appropriate to implement. Trust originates from the fact that the individual will have carved a reputation for having the tools and skills necessary to implement and assess COBIT effectively in their enterprise. 3. Setting oneself apart from the others—In a governance role, the professional’s knowledge of COBIT will set him/her apart from the rest and speaks to his/her level of commitment to the profession. The courses equip the participants with Volume 3, July 2013 Page 7 unmatched knowledge in the form of concepts, principles and processes. This knowledge is crucial in implementing and assessing COBIT. In addition, commitment to COBIT training allows the professional to be on the cutting edge of knowledge and practice. 4. Increased confidence and capability—Individuals can sharpen their capabilities and enhance confidence by understanding the levels of IT-related risk and making informed decisions to reduce information security incidents. Delivering this understanding and risk awareness to improve prevention, detection and recovery within an enterprise is vital. The trained COBIT professional is able to provide tools for organizations to maintain high-quality information to support business decisions as well as to help the enterprise meet regulatory, statutory or governmental requirements. 5. Credibility—Training organizations and individuals who offer COBIT 5 training and exams must first go through a meticulous accreditation process. Individuals who attend training with an accredited training provider can be certain they are receiving the highest quality training. Exams are rigorous, challenging and consistent, and, as a result, individuals can be proud of their achievement. In addition, employers will have the confidence of knowing their employees’ COBIT credentials come from a reputable and reliable source. COBIT 5 Training Paths There are two training paths: • The implementation path is for those interested in learning how to apply the COBIT 5 framework and COBIT 5: Enabling Processes and how to analyze the results. Upon completion of the training and exam, attendees are able to apply COBIT 5’s good-practice, continual-improvement, life-cycle approach to GEIT, tailored to suit the needs of a specific enterprise, and implement, or advise an enterprise on implementing, a framework for the governance and management of enterprise IT using COBIT 5. • The assessor path is for individuals interested in performing COBIT 5-based assessments using the ISO/IEC 15504 approach. This training provides the main guidance on performing a process capability assessment; the roles, responsibilities and competencies required; and the key steps, from assessment initiation to assessment results reporting. ® The assessor course and exam is practitioner-level training that focuses on how to apply the COBIT 5 Process Assessment Model (PAM) and how to analyze the results. Upon successful completion of the assessor course and exam and upon meeting specific knowledge requirements, candidates are able to apply to ISACA to be designated as a COBIT Certified Assessor. This designation is the only globally accepted certification for COBIT assessors. Both training paths require first passing the COBIT Foundation exam. COBIT 5 Examinations The COBIT Foundation exam focuses on robust testing of the knowledge and comprehension of the foundation concepts and principles of COBIT. The following describes the COBIT Foundation exam format: • Multiple-choice questions • 50 questions per exam • 50 percent (25/50) pass mark • 40-minute duration • Closed book The COBIT Implementation and COBIT Assessor exams are practitioner-level and follow an objective testing environment (OTE) format. The COBIT Implementation exam format is as follows: • Four OTE questions (20 marks per question) • 150 minutes ® • Open book (only COBIT 5 Implementation is permitted) • 50 percent (40/80) pass mark The COBIT Assessor exam format is as follows: • Eight OTE questions (10 marks per question) • 150 minutes ® ® • Open book (only COBIT 5 Assessor Guide: Using COBIT 5 and COBIT Process Assessment Model (PAM): Using ® COBIT 5 are permitted) • 50 percent (40/80) pass mark Volume 3, July 2013 Page 8 Learn more about taking the COBIT 5 exam, the COBIT 5 training qualification scheme and COBIT 5 training providers on the ISACA web site. Mark Thomas Is president of Escoute Consulting in Olathe, Kansas, USA, and a trainer for ISACA. Thomas is a nationally known ITIL and COBIT expert with more than 20 years of professional experience. His background spans leadership roles from chief information officer to management and IT consulting. A consultative trainer and speaker in several disciplines, Thomas provides training services for major training firms and consulting clients in disciplines including business analysis, ITIL, COBIT, MOF, ISO 20000, TOGAF and IT strategy. Come join the discussion! Jorge E. Barrera N. will respond to questions in the discussion area of the COBIT 5—Use It Effectively topic beginning 22 July 2013. Evidence Management for the COBIT 5 Assessment Programme By Jorge E. Barrera N., CISA, CGEIT, CRISC, COBIT (F), ITIL V3F, PMP 1, 2, 3, 4 This article presents a proposal based on the COBIT 5 Assessment Programme for a quick and consistent start to the ® ® implementation of COBIT 5 in any IT environment, whether currently based on COBIT 4.1 or not. 5 From a conceptual point of view, COBIT 5 is fascinating for its incorporated principles and its generic model of enablers. Besides that, its assessment program helps IT leaders provide a business view of IT’s ability to create value and support enterprise goals through effective IT processes. The results of this program provide a determination of process capability and can be used for: • Delivering value to the business. This is viewed as an incremental achievement of strategic goals and a clear realization of business benefits through effective and innovative use of IT. • Developing IT process improvement. Periodic measurement of IT processes supports the definition of effective governance of enterprise IT (GEIT) road maps to drive continuous improvement. • Measuring the achievement of business goals. Each business goal can be evaluated every time the related GEIT processes are evaluated. To do so, one can use COBIT 5’s matrix with relationships between business goals and GEIT processes. • Generating consistent reports. Reports on the state of the organization’s GEIT are derived from the assessment ® ® process, which is supported by the COBIT Assessment Programme methodology and tools, using the COBIT Process ® Assessment Model (PAM): Using COBIT 5 (COBIT 5 PAM) and COBIT 5: Assessor Guide, makes the results consistent and reliable. • Ensuring organizational compliance. All kinds of laws and regulations, which can affect the organization’s GEIT, fall under the definition of inputs of the COBIT 5 framework and PAM for facilitating their compliance. • Benchmarking. Periodic measurement of GEIT process capabilities allows for constructive and ongoing comparison between businesses employing the same or equivalent industry best practices. In addition to these benefits generated by the implementation of the COBIT 5 Assessment Programme, this article adds the following short-term benefits: • Substantial improvement of GEIT understanding in practice • Consolidated understanding of the need to use COBIT 5 as a GEIT umbrella • Integrated and effective use of GEIT frames and standards through the alignment provided by COBIT 5 as the umbrella framework • Appropriate support to the natural complexity of managing all work products related to the COBIT 5 framework and PAM • Standardized treatment of all former GEIT achievements by transitioning them to a COBIT 5 environment in practice, as a result of the first assessment The magnitude of these benefits greatly depends on the mode with which evaluations are made. A measurement can be Volume 3, July 2013 Page 9 based on personal judgments, judgments based on formal guidance or judgments based on formal guidance with defined evidence requirements. Measurements based on judgments alone may suffer from a high degree of uncertainty that applies to the business case and action plans derived from it. These drawbacks can be obviated if assessments based on judgments ® ® are considered, as posed in COBIT Self-assessment Guide: Using COBIT 5, as a precursor to more rigorous evaluations based on evidence. The evidence management model presented in this article therefore responds to a real need; its main parts are: • Taxonomy of the evidence management • Relationships between elements of the COBIT 5 PAM • Alignment and integration of the frameworks for GEIT around COBIT 5 • GEIT artifacts baseline or GEIT evidence baseline • A method for qualifying the level/degree of evidence • Life Cycle of Evidence Management Model The primary objective of this article is to motivate readers to decide to initiate or improve their GEIT implementations using COBIT 5 as the umbrella framework. Assessing the IT environment of the organization based on PAM and an evidence management model, such as the one presented in this article, provides a good foundation for this purpose. Taxonomy of Evidence Management The predominant entities for managing evidence are grouped as: • Elements of the COBIT 5 PAM Model: IT process, capability level, attribute, result, work product, generic work product, generic practice, outcome, content, base practice, output, input and rating level. The definition of these terms is in section 1.7 of the COBIT 5 PAM. • Derived elements from GEIT frameworks: Called artifacts, the elements of this group can be distinguished in the following 12 categories: - Cat01 Inputs from outside of COBIT 5 - Cat02 Outputs or work products of COBIT 5 processes - Cat03 Outputs of ITIL V3 processes and other aligned frameworks - Cat04 Outputs of auditing and monitoring frames - Cat05 Guides and other documents derived from COBIT 5 processes - Cat06 Guides and other documents derived from aligned frameworks - Cat07 Guides and other documents derived from monitoring frames ® - Cat08 Guides derived from COBIT 5 Implementation - Cat09 Deliverables generated by continual improvement projects - Cat10 Artifacts related with deliverables - Cat11 Support bibliography - Cat12 Guides and other documents derived from the controlled evolution of the proposal presented in this article (G2eTIC Project) The elements of these 12 artifact categories generally correspond to frameworks’ specific topic documents. These documents are related among them. The elements of output categories may also correspond to services or other results. Frameworks that can be aligned to COBIT 5 by the proposal of this article are ITIL V3, ISO 2700X, The Open Group Architecture Framework (TOGAF), ArchiMate, the Project Management Body of Knowledge (PMBOK), the Capability Maturity Model Integration (CMMI), Microsoft Operations Framework (MOF) and ad hoc regulatory frameworks for monitoring and control. Relationships Among Elements of COBIT 5 PAM An analysis of the figures and contents of COBIT 5 PAM results in the following semantic relationships: • Each process has its specific outcomes. • Level 1 of each process must be evaluated according to the current state of its outcomes. • Levels 2 to 5 of each process have two attributes each. • For levels 2 to 5, each attribute defines several results. • Each result requires a single generic practice. • The generic practices apply to levels 2 to 5 of all COBIT processes. Volume 3, July 2013 Page 10 • • • • • The generic practices apply equally to the results of the attributes of the levels of each COBIT process and the generic work products (GWP). ® The COBIT 5 PAM base practices are the same governance and management practices defined in COBIT 5: Enabling Processes. The COBIT 5 PAM work products are the same outputs that are defined in COBIT 5: Enabling Processes, in which they are defined for each governance and management practice of the process. The inputs are defined in the same manner. COBIT 5 PAM relates the outcomes of each process with the base practices and the inputs and outputs of each process. COBIT 5 PAM relates the GWP of the processes directly with the capability levels of the processes; therefore, it is not possible to evaluate the capability levels of the attributes based on GWP. However, a useful perspective is to assess directly the capability level of the process by the GWP concept. These semantic considerations help in understanding COBIT 5 PAM and are the foundation of its practical application. Alignment and Integration of GEIT Frameworks Around COBIT 5 Figure 1 presents the role of COBIT 5 as the umbrella framework that defines the conceptual spectrum of GEIT; the other frameworks/standards operate as contributors. For example, ITIL V3 covers just under 30 percent of GEIT and ISO/IEC 6 27001 covers just under another 15 percent. As figure 1 illustrates, the scopes of ITIL V3 and ISO 27001 are part of the larger GEIT picture—focusing on them in isolation when addressing the overall GEIT picture raises a risk that relationships with the rest of the GEIT spectrum cannot be optimally understood or justified. As such, a major part of the GEIT spectrum would remain outside the respective business case of the organization. It is necessary to take into account in an integrated way COBIT 5, ITIL V3, ISO/IEC 27001 and other related standards and Figure 1—COBIT 5 Coverage of Other Standards and Frameworks Source: ISACA, COBIT 5, 2012, figure 25 Volume 3, July 2013 Page 11 frameworks in implementing GEIT. The following structure of activities and results defines a strategy for alignment and integration between frameworks: • Stage one—Domains of COBIT, ITIL V3 books, ISO 27001 domains, core and phases of TOGAF, and domains of other frameworks • Stage two—Processes of COBIT, ITIL V3 book chapters, control objectives of ISO 27001, artifact categories of TOGAF and second stages of other frameworks, such as CMMI constellations • Stage three—COBIT governance practices, processes/functions/activities of ITIL, ISO 27001 controls and processes of other frameworks. This stage includes the diagrams, catalogs and TOGAF matrices. • Stage four—Outputs of COBIT governance practices and of processes of aligned frameworks. This stage also includes defined activities or tasks of different frameworks. The proposed alignment and integration of this article, based on COBIT 5 as the umbrella framework and GEIT at the hypocenter of the third and the fourth stages of the structure, is grounded on the following statements: • The GEIT implementation unit is the governance or management practice of COBIT 5. In terms of PMBOK, this is to say, as a general guide, that each work package of IT projects is a governance practice of COBIT 5 to be implemented or improved with its respective outputs. • Processes of aligned frameworks are selected for implementation with their own identity when they generate outputs equivalent to COBIT 5 work products. This amounts to saying that the selected process makes a primary contribution to GEIT. • Detailed analysis concluded that all processes, functions and activities of ITIL V3 and 112 controls of ISO/IEC 27001 deserve implementation with proper identity. This represents less than 50 percent of GEIT. The remaining 21 controls of ISO/IEC 27001 make secondary contributions to GEIT. • Processes of other frameworks, such as TOGAF, PMBOK, CMMI and MOF, that generate outputs equivalent to the work products of COBIT 5 and are not covered by ITIL V3 and ISO/IEC 27001 can be implemented with their own identities. • Governance and management practices of COBIT 5 that are not represented by processes of other frameworks should be implemented directly with their own identities. This should draw upon the secondary contributions from other frameworks. • All catalogs, matrices and diagrams proposed by TOGAF are considered elements that must be taken into account by processes of COBIT 5 and processes of aligned frameworks that are being implemented. ® • The more than 440 outputs of governance practices defined by COBIT 5 and the 208 outputs defined by COBIT 5 for Information Security should be treated in an integrated manner by each governance and management practice. This statement also applies for the outputs defined in the future by forthcoming COBIT 5 guides. • The GEIT contribution that an element of the aligned framework makes is considered primary when it is sufficient to optimally support the functionality covered by its scope. Otherwise, this contribution, if it exists, is considered secondary. An ITIL V3 process is implemented, then oriented, to determine each work product of COBIT 5 that applies to it. The definition of activities; inputs; outputs; the Responsible, Accountable, Consulted and Informed (RACI) matrix; goals; and metrics should be guided by the architecture of COBIT 5 processes. However, this definition must use and leverage the ITIL V3 contribution. The same applies for any ISO 27001 control and any process of aligned frameworks that was chosen for implementation. The alignment and integration strategy proposed in this article allows, for example, for the initial use of TOGAF by mapping to the catalogs, matrices and diagrams proposed. These elements are generated from the umbrella of COBIT 5 without the need to understand the whole philosophy of TOGAF in order to achieve its benefits. This initial use without preamble of TOGAF opens the doors to TOGAF’s ArchiMate ally, which is a standard that facilitates the management of elements defining enterprise architectures and the relationships among these elements. The use of COBIT, ITIL, ISO/IEC standards, TOGAF, ArchiMate and PMBOK elements, as well as those of other GEIT frameworks and standards, must apply intellectual property rights defined by each of the respective owners. GEIT Artifacts Baseline or GEIT Evidence Baseline All elements of GEIT frameworks implemented in the organization—the 12 artifact categories defined previously—constitute the evidence to support the assessment of COBIT 5 processes at the beginning of the GEIT program and in its entire existence in the organization. Registering GEIT artifacts that are operating is performed in the baseline of GEIT artifacts of the organization. This baseline must support the release management and the distribution management of the organization’s Volume 3, July 2013 Page 12 artifacts. In the management of this baseline of artifacts, the following four recording aspects are distinguished: • Single record of artifacts—The use of the alignment and integration structure of frameworks, described previously, enables the definition of a single identification code structure of artifacts with the following stages of GEIT: 1. Category of artifacts 2. Framework that is valid in the category 3. Domains of the framework 4. Processes for COBIT 5 (or identifier level for other frameworks) 5. Governance or management practices for COBIT 5 (or process for other frameworks) 6. Outputs or work products for COBIT 5 (or process activity for other frameworks) 7. Version of work products or activities 8. Repetitions for outputs for COBIT 5 (or improvements for other frameworks) • When the third stage is set to “000,” all lower stages take the same value “000” to indicate that the artifact applies, in a generalized way, its content to that stage and to the dependent stages. Relationships of COBIT 5 PAM model elements—These elements were listed in the definition of the taxonomy of the evidence management described previously. This article emphasizes the following relationships among GEIT work products and: - Outcomes of each COBIT 5 process - Results of attributes at each capability level of the COBIT 5 processes - Generic work products of each COBIT 5 process The first two items give support to evidence-based assessments using the COBIT 5 PAM as illustrated in figure 2. The third item supports the evaluation, also with evidence, of the state of the generic work products of each COBIT 5 process. Figure 2—Link Between the Evidence Model and PAM Process’s Outcomes Evidence per Each Outcome Results per Each Attribute Evidence per Each Result The process attributes provide the measurable characteristics of process capability. Volume 3, July 2013 GEIT Artifacts Records Page 13 • • Umbrella-type relationships—Other frameworks/standards correspond based on the governance and management practices in COBIT 5 that are defined for alignment of the frameworks: - To and from elements derived from the application of frameworks aligned like ITIL V3, ISO 27001 and others - To and from elements derived from the application of frameworks oriented to verification and monitoring - To and from elements derived from the application of regulations specific to the organization and its environment Several benefits can be realized from this mapping, such as: - A gap analysis between the implemented GEIT framework and the COBIT 5 framework guidance - A quality assessment of the implemented artifacts - A statement of applicability for each governance and management practice, with due justification for its inclusion or exclusion - A gap analysis of the implemented governance and management practices and those that are rigorously necessary - Road maps at the governance and management practices and processes levels of COBIT 5 for the short, medium and long term Other relationships for assessment purposes—Relationships among the following fall into this category: 7 - Inputs and outputs defined by the continual improvement life cycle approach for each of its phases - Enablers defined in COBIT 5 - Enterprise goals and their metrics - IT-related goals and their metrics - Goals of COBIT 5 processes and their metrics - All other metrics proposed by COBIT 5 and adopted by the organization Therefore, this GEIT artifacts baseline supports the record of all work products related to the COBIT 5 PAM and the management among them of relationships that are required by its assessment processes. Method for Qualifying the Level/Degree of Evidence The method for qualifying the level/degree of evidence is based on figure 2, which includes figure 4 of the COBIT 5 PAM and the fragment of the evidence model’s entity relationship diagram with which it is paired. Figure 3—Assessment of Level 1 LEVEL OUTCOME EVIDENCE CALCULATION: LEVEL 1 ONLY From the single record of artifacts described previously, the steps for evaluating the capability level of each COBIT 5 process selected for assessment follow. • ATTRIBUTE AS % CALCULATION: ATTRIBUTE % OUTCOME ART + JUST % OUTCOME ART + JUST % OUTCOME ART + JUST % Step 1: Use the respective Microsoft Excel spreadsheets ® provided in the COBIT 5 Implementation tool kit and customize them with the changes illustrated in figures 3 and 4. Figure 4—Assessment of Levels 2 to 5 • Figure 3 illustrates the macro diagram of the matrix used for the evaluation of specific outcomes of each COBIT 5 process. Figure 4 illustrates the macro diagram of the matrix used for the assessment of levels 2 to 5 of the process. For a record of the evidence of every outcome and every result, one needs to insert two columns with the following registration purposes: - ART: For codes of artifacts that represent evaluation criteria. This column of figure 3 corresponds to the “Evidence per Each Outcome” entity of figure 2. In figure 4, this column corresponds to the “Evidence per Each Result” entity of figure 2. - JUST: For justification of the assigned percent Step 2: For each outcome, one must identify the documentary artifacts that represent it in reality and therefore constitute its Volume 3, July 2013 LEVEL ATTRIBUTE RESULTS EVIDENCE AS % CALCULATION: LEVEL CALCULATION: ATTRIBUTE % RESULT ART + JUST % RESULT ART + JUST % CALCULATION: ATTRIBUTE % RESULT ART + JUST % RESULT ART + JUST % CALCULATION: LEVEL % Page 14 • • evidence. Evaluate the percent of quality and completeness that this support provides to the outcome. To do so, enter the respective codes of artifacts in the ART column, analyze the evidence that these documents provide to the outcome, and then enter in the AS column the percent value that one assigns to the outcome. After that, enter in the JUST column the concrete justification based on evidence about the assigned percent value. The Excel sheet should calculate the average percent corresponding to attribute and level 1. The allocation of the percent should be in accordance with the rating levels that are indicated in figure 4 of the COBIT 5 PAM. Step 3: For each attribute’s result of the process, one must proceed equivalently as done in step 2. The Excel spreadsheet shall provide the calculations of the average percent corresponding to the attributes of levels 2 to 5 of the process, and it shall calculate the average percent of these levels, as well. Step 4: For allocating the process capability level, one should proceed as is indicated in Figure 5—Levels and Necessary ® ® Ratings of COBIT Self-assessment Guide: Using COBIT 5. As an additional advantage of semantic relationships of the COBIT 5 PAM, which are described previously, further evaluation of the 25 capability levels based on the GWP is proposed. Figures 5 and 6 illustrate the macro diagrams of the respective matrices. In columns marked “ART + JUST” in figure 5, one should proceed in an equivalent manner as one did for these columns in figure 3. The Excel sheet of figure 5 should calculate the percent value for each GWP. One must bring all GWPs’ percent values from figure 5 to figure 6. The Excel sheet of figure 6 will calculate the percent values for levels 2 to 5. One should note that the calculation of average percent by the Excel sheet in figure 6 for each capability level does not consider attributes. The outcome of this assessment should be consistent with the assessment of levels 2 to 5, as shown in figure 4. Figure 5—Assessment of GWPs GWP CONTENT EVIDENCE AS % CALCULATION: GWP CONTENT ART + JUST % CONTENT ART + JUST % % CALCULATION: GWP CONTENT ART + JUST % CONTENT ART + JUST % Figure 6—Direct Assessment of Levels 2 to 5 LEVEL GWP CALCULATION: LEVEL AS % GWP % GWP % CALCULATION: LEVEL % GWP % GWP % Life Cycle of Evidence Management Model The following steps are proposed as part of the actual and effective beginning of GEIT implementation in an organization: 1. Inventory current GEIT documentation—It employs a matrix with the following columns: ID code of the document, version, name, description, format, owner area, responsible person, stakeholders and frameworks. The inventory should cover all actual documents related with IT management in the organization, even those not formally authorized but in operation. Special care must be taken with artifacts related with documents that come from outside of COBIT 5 and are ® defined in COBIT 5 for Information Security. 2. Categorize documents—Each document identified in the inventory must be mapped to the 12 categories of artifacts of frameworks proposed in this article. The same matrix from step 1 can be used, adding 12 columns, or a new and specific matrix can be developed for this purpose. 3. Map COBIT 5 processes—Several relationships among documents or artifacts and the GEIT processes should be ® documented in a matrix. This exercise reinforces the knowledge of COBIT 5 and must be supported by the COBIT 5 Enabling Processes guide. ® ® 4. Complete nonrigorous evaluation of COBIT 5 processes—COBIT Assessment Programme Tool Kit: Using COBIT 5 should be used to evaluate COBIT 5 processes and the matrices of the previous steps. The respective assessment reports should be prepared and distributed as established by the organization in order to gain approbation and encouragement for the next steps. 5. Map outputs to the documents—The outputs or work products of COBIT 5 processes could be taken from figure 7 and Volume 3, July 2013 Page 15 6. 7. 8. 9. 10. appendix B.2 of the COBIT 5 PAM, but it is more useful to pick them from the level of governance practice in COBIT 5: ® Enabling Processes and COBIT 5 for Information Security. The work products are located in the rows of the matrix to be used for mapping, and for each of them, the related documents should be identified. Several benefits can be derived from this mapping, such as those enumerated previously in this article regarding the umbrella type relationship. Complete first version of the baseline of GEIT artifacts—The categories of artifacts CAT02, CAT03 and CAT04 represent work products. All documents recorded in the inventory of the 12 categories defined should be modularized in terms of work products, either by direct conversion or by mapping matrices. This exercise does not involve redoing, but decomposing into parts the artifacts that are in operation. It can be done in parallel with step 5. As part of the exercise, it also standardizes and allocates codes to the modularized artifacts. This new registration of standardized artifacts and their relationships is the first version of the baseline of GEIT artifacts. Complete standard evaluation using evidence support—The baseline of GEIT artifacts constitutes the adequate evidence for the COBIT 5 Assessment Programme. The method outlined previously in this article for each selected process to be evaluated should be followed. The respective assessment reports should be prepared and distributed as established by the organization. These reports can then be categorized and recorded in the baseline of GEIT artifacts because they are, by themselves, implementation evidence of some work products of COBIT 5 processes. Complete business case and project development—Evaluations proposed in this article support the precise definition of the GEIT business case and its respective definition of projects. See sample of business cases in COBIT 5 Implementation. Update the baseline of GEIT artifacts—This baseline is updated by: • Laws and other regulations that affect the GEIT of the organization • The operation of GEIT every day. This refers to categories of artifacts: - Outputs of COBIT 5 processes that are in operation - Outputs of aligned frameworks that are in operation - Outputs from monitoring and control frameworks • Results from GEIT projects, always oriented to continual improvement. They are artifacts of the other nine categories. Return to step 7. This sequence of steps corresponds to an evidence management perspective in measuring capability levels of processes. The implementation of this life cycle should be adapted depending on the orientation that each organization takes from ® ® ® COBIT 5 Implementation and COBIT Assessor Guide: Using COBIT 5. ® A self-learning exercise is suggested in the business case sample presented in COBIT 5 Implementation, and the evaluation ® of GEIT processes should be supported by the tools defined in the appendices of COBIT Assessor Guide and its critical success factors. Expectations and Conclusions The potential of mappings that are supported by the baseline of GEIT artifacts opens the doors to an effective implementation, as it generates knowledge and confidence to stakeholders and, thus, facilitates the obtaining of necessary management support. The mappings from artifacts to COBIT 5 processes, combined with the mapping of IT process goals to IT-related goals and on to enterprise goals, provide the necessary support to make bottom-up assessments on the cascade of COBIT 5 goals. This mapping supports a positive effect on the management of the GEIT balanced scorecard of the organization—linking IT process capability improvement opportunities directly with enterprise goals. It is estimated that the first record with total quality of the GEIT evidence and an initial evaluation of COBIT 5 processes may take no more than three months, depending on the size and location of the organization, the defined scope, and the resources allocated to this purpose. Acknowledgment The content of this article is the result of work done by the G2eTIC Project, which was conceived with an academic and business orientation. References to documents of COBIT 5 and the use of its content are made in accordance with the ® respective license agreement between ISACA and the author of this article. G2eTIC has the conceptual bracket, methodological tools and complementary tools corresponding to the proposal presented in this article. Volume 3, July 2013 Page 16 Jorge E. Barrera N., CISA, CGEIT, CRISC, COBIT (F), ITIL V3F, PMP Is an independent consultant in governance and management of IT in the enterprise and author of the Project G2eTIC, which develops a set of seminars and tools for practical learning and integrated use of COBIT 5. Barrera can be reached at jorgeebarrera@yahoo.com. Endnotes 1 ISACA, COBIT® Process Assessment Model (PAM): Using COBIT® 5, 2012 2 ISACA, COBIT® Assessor Guide: Using COBIT® 5, 2012 3 ISACA, COBIT® Self-assessment Guide: Using COBIT® 5, 2012 4 ISACA, COBIT® Assessment Programme Tool Kit: Using COBIT® 5, 2012 5 ISACA, COBIT® 5: A Business Framework for the Governance and Management of Enterprise IT, 2012 6 Ibid. 7 ISACA, COBIT® 5 Implementation, 2012 COBIT Focus is published by ISACA. Opinions expressed in COBIT Focus represent the views of the authors. They may differ from policies and official statements of ISACA and its committees, and from opinions endorsed by authors, employers or the editors of COBIT Focus. COBIT Focus does not attest to the originality of authors’ content. © ISACA. All rights reserved. Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the association. Please contact Julia Fullerton at jfullerton@isaca.org. Framework Committee Steven A. Babb, CGEIT, CRISC, UK, chair David Cau, ITIL, MSP, Prince2, France Sushil Chatterji, CGEIT, Singapore Frank Cindrich, CGEIT, CIPP, CIPP/G, USA Joanne De Vito De Palma, USA Jimmy Heschl, CISA, CISM, CGEIT, ITIL, Austria Katherine McIntosh, CISA, USA Andre Pitkowski, CGEIT, CRISC, OCTAVE, Brazil Paras Shah, CISA, CGEIT, CRISC, CA, Australia Editorial Content Comments regarding the editorial content may be directed to Jennifer Hajigeorgiou, senior editorial manager, at jhajigeorgiou@isaca.org. ©2013 ISACA. All rights reserved. Volume 3, July 2013 Page 17
© Copyright 2024