S 3.83 Analysis of security-relevant personnel factors

Initiation responsibility: IT Security Officer, Head of Personnel

Implementation responsibility: Supervisor

The employees of an organisation are one of the most important cornerstones for an organisation's information security. Experience has shown that even the most sophisticated technical security safeguards are of no use without the proper behaviour of the employees. This essentially requires awareness of what information security means to the organisation and its business processes and the proper way of handling the organisation's information to be protected by the employees.

Therefore, the security safeguards selected for the organisation should always be employee-oriented. In this, their know-how and handling of information and IT should be incorporated. Thus, it makes sense to analyse the different factors contributing to the behaviour of the employees from a security point of view. Building upon the aforementioned, it can then be examined where the personnel and organisational security can be improved, for example by means of information security awareness and training.

The following aspects should be considered:

Security culture

The term security culture comprises the security-related attitudes, values, and basic beliefs of an organisation and all of its employees. The security culture also includes the issue of how open questions regarding information security are handled in the organisation. For example, a trusting and open communication culture is important for addressing security incidents effectively and efficiently so that security incidents are immediately reported and handled in a solution-oriented manner.

The security culture of an organisation is strongly influenced by the industry the organisation is operating in. In high-security areas, information is naturally handled more restrictively than in research facilities.

Know-how and skills

Security policies

Applications and IT

Management

Cultural backgrounds

Modifications

If the analysis results in the finding that the employees' behaviour deviates from the behaviour that makes sense from a security point of view, this may be handled differently. For example, attempts to change the behaviour could be made (see S 1.13 Information security awareness and training). On the other hand, it may be significantly easier to adapt the security policies or workflows, because changes in behaviour can only be achieved in the long term.

Review questions: