8.6.1 Resource Management and Team Establishment
This section emphasizes the importance of resource management and the establishment of teams to effectively manage security operations and respond to disruptive or undesirable events. Here's a detailed breakdown:
- Resource Availability:
Top management is responsible for ensuring the availability of essential resources to establish, implement, maintain, and improve the Security Operations Management System (SOMS). These resources encompass the following:
- Information: Necessary data and knowledge required for security operations management.
- Management Tools: Tools and systems to support effective management.
- Human Resources: Skilled personnel with specialized knowledge and expertise.
- Financial Support: Adequate financial resources to support security operations management.
- Roles, Responsibilities, and Authorities:
Roles, responsibilities, and authorities within the organization must be clearly defined, documented, and communicated. This clarity facilitates effective security operations management, including control, coordination, and supervision. Additionally, a defined line of succession should be established for continuity in case of role changes.
- Establishment of Teams:
To handle disruptive and undesirable events effectively, the organization must establish planning, security, incident management, response, and/or recovery teams. These teams should have the following characteristics:
- Defined Roles: Each team member's responsibilities and roles should be well-defined.
- Appropriate Authority: Team members should have the necessary authority to make decisions.
- Adequate Resources: Teams should have access to the required resources, including effective and safe equipment.
- Rehearsed Plans and Procedures: Operational plans and procedures should be rehearsed and well-understood by team members.
- Subcontracting or Outsourcing:
If the organization chooses to subcontract or outsource any process that impacts compliance with this International Standard, it must ensure that these processes are controlled. This control ensures that the outsourced activities align with the organization's security operations management requirements.
By addressing these aspects, organizations can better manage their resources, establish effective teams, and ensure control over outsourced processes, all contributing to the successful implementation of the Security Operations Management System (SOMS).