Comprehensive security is a process

Insta's consulting service provides an organization with comprehensive insight as to the type of basic pillars upon which its operational security rests and how the support structures can be strengthened.

Understanding of the factors affecting overall security is not something you get at a snap of the fingers. Security is a complex combination of technology, attitude, expertise gained through experience, and the ability to visualize big pictures. It is essential to address the overall security of a company or organization as a process that requires monitoring and updating.

What are the things that affect comprehensive security?

Depending on the organization's goals, comprehensive security can be approached from different angles. Risks can be prevented and minimized within the organization's own operations, but some of the factors affecting security are related to the operating environment or to a wider reference framework. Consulting on comprehensive security, as the name suggest, involves the evaluation of the big picture, including the following:

  • Organizational security culture
  • Personnel safety
  • Security of the premises
  • IT system security
  • Environmental security
  • Occupational safety
  • Economic situation
  • Risk management
  • Disruption and emergency situations
  • Security policy and responsibilities

Managed process ensures the continuity of the organization's operations

Consulting on comprehensive security is divided into four sections that reflect the areas of comprehensive security.

  • Security mapping
  • Threat and risk assessment
  • Technical information security inspection
  • Consideration of information security requirements in building systems

Security mapping and threat and risk assessment are essential tools for understanding the big picture. They provide a background for the measures and are a prerequisite for development. Consulting on comprehensive security helps to create the conditions required for the continuity of the organization's operations and make it possible to prepare for any security threats.

Security consists of parts

Security mapping

Careful background work is a prerequisite to developing security. The purpose of safety mapping is to investigate the effect that various preconditions, whether set from outside or related to internal structures, operating methods and strategic policies, have on comprehensive security. The starting point is an interview where background information about the organization's business requirements is collected. The interview addresses matters such as any societal requirements for the organization's infrastructure, the operating environment, and risk management.

 

As with all development, commitment is the key in security development. After the interview, the first part of the safety mapping focuses on organizational security policy and the commitment of business leadership to developing comprehensive security. The second part deals with administrative security. This includes consideration of incident management, personnel safety, stakeholder safety and business continuity planning, among other things. The last two areas address physical security such as business premises and rights management, as well as technical aspects, including ICT security.

 

As a result of the safety mapping, the organization receives a final report that presents the current status and development needs as well as defines concrete measures for measuring security and proposals for improving comprehensive security.

 

Security mapping areas:

  • Background interview
  • Security management status
  • Administrative security
  • Facilities and rights
  • Technical security
  • Report
Threat and risk assessment

Assessing threats and risks in advance helps the organization prepare, anticipate and secure its business continuity. Not every risk factor, especially inadvertent ones, can be anticipated. However, notifying the staff of risks that could damage the business, training, and the preparation of policy guidelines minimize the impact of risks if they occur. It may even be that identifying a threat or risk in advance will lead to a change in the organization's behavior that completely eliminates the threat.

 

We do risk and threat assessments as part of our consulting on comprehensive security. The process starts with threat assessments and the creation of a threat scenario. The objects to be protected are identified and the likelihood and severity of the risks are estimated. Based on the estimates, a risk management plan is created that guides action in the most appropriate way for the organization. The final report documents all stages of the process, describes the objects to be protected, and presents concrete measures to remove the threats and risks. The report may also include a training plan or procedural guidelines. If needed, we will also support the implementation of the results and actions derived from the threat and risk assessment into the organization's operations. 

Technical information security inspection

We start an inspection in co-operation with the customer by charting the objects to be protected as well as the security requirements for the environment. Based on this information, we will perform threat modeling and draft a plan for the implementation of the analysis phase.

During the analysis phase, we investigate the weaknesses and potential vulnerabilities in the security of the target system. We focus on the essential, emphasizing the components that we recognize as being risky. Based on the observations made, we will draft a final report containing a detailed, prioritized proposal for further action. If necessary, we will support the implementation of the measures and verify their effectiveness by performing a reinspection.