Open Information Security Management Maturity Model: Difference between revisions
Line 12: | Line 12: | ||
==Availability== |
==Availability== |
||
[[The Open Group]] provides {{cite web|url=https://publications.opengroup.org/c17b||title=O-ISM3 v.20}} free of charge to organisations for their own internal noncommercial purposes. |
[[The Open Group]] provides the standard {{cite web|url=https://publications.opengroup.org/c17b||title=O-ISM3 v.20}} free of charge to organisations for their own internal noncommercial purposes. |
||
==See also== |
==See also== |
Revision as of 13:28, 4 February 2020
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
The Open Group information security management maturity model (O-ISM3) is an Information Security Management Framework that provides an approach for designing, planning, implementing, and governing information security management systems.[citation needed]
History
The original motivation behind O-ISM3 development was to narrow the gap between theory and practice for information security management systems, and the trigger was the idea of linking security management and maturity models. O-ISM3 strove to keep clear of a number of pitfalls with previous approaches.[1]
The "O-ISM3". {{cite web}}
: Cite has empty unknown parameter: |1=
(help) website indicates that the project looked at Capability Maturity Model Integration, ISO 9000, COBIT, ITIL, ISO/IEC 27001:2013, and other standards, and found some potential for improvement in several fields, such as linking security to business needs, using a process based approach, providing some additional details (who, what, why) for implementation, and suggesting specific metrics, while preserving compatibility with current IT and security management standards.
Availability
The Open Group provides the standard "O-ISM3 v.20". {{cite web}}
: Cite has empty unknown parameter: |1=
(help) free of charge to organisations for their own internal noncommercial purposes.
See also
References
- ^ Siponen, Mikko (2002-08-24). Designing Secure Information Systems and Software: Critical evaluation of the existing approaches and a new paradigm. OULU 2002, 24 August 2002. Retrieved from http://jultika.oulu.fi/files/isbn9514267907.pdf.