Posts

Showing posts from June, 2021

Are our infosec controls sufficient?

Image
^ Although it's tempting to dismiss such questions as rhetorical, trivial or too difficult, there are reasons for taking them seriously*. Today I'm digging a little deeper into the basis for posing such tricky questions, explaining how we typically go about answering them in practice, using that specific question as an example. OK, here goes. The accepted way of determining the sufficiency of controls is to evaluate them against the requirements. Adroitly sidestepping those requirements for now, I plan to blabber on about the evaluation aspect or, more accurately, assurance . Reviewing, testing, auditing, monitoring etc . are assurance methods  intended to i ncrease our knowledge.  We gather relevant data, facts, evidence or other information concerning a situation of concern, consider and assess/evaluate it in order to: Demonstrate, prove or engender confidence that things are going to plan, working well, sufficient and adequate in practice, as we hope; and Identify and idea...