T 2.66 Inadequate security management

The large number of methods and procedures for handling, processing, and storing information in business processes can quickly result in incorrect estimates of the protection requirements of business-critical information, and therefore to the inadequate protection of this information. For this reason, it is essential to use an organised approach for the planning, execution, and monitoring of the security process. Experience shows that it is not enough just to require security safeguards to be implemented because the individuals concerned, and especially the IT users, are often overwhelmed due to a lack of technical expertise and a lack of time. As a consequence, they often fail to implement the security safeguards at all, which means the level of security reached will be unsatisfactory. Even when an adequate security level has been achieved, it is still necessary to continuously adapt and improve the security process so that it can be maintained at all times during ongoing operations.

An inadequate security management is often a symptom of poor overall organisation of the security process. Examples of specific threats resulting from an inadequate security management include the following: