Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/308756945

Improvement of ISO/IEC 20000 standard through the combination with


ISO/IEC 27001

Article · November 2014

CITATIONS READS

0 1,450

4 authors, including:

Asmir Butkovic Nikos E Mastorakis


UCD School of Computer Science Technical University of Sofia
9 PUBLICATIONS   35 CITATIONS    970 PUBLICATIONS   5,669 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Optimal software quality management tools design View project

Visualization for Information Retrieval in Regional Distributed Environment View project

All content following this page was uploaded by Nikos E Mastorakis on 30 September 2016.

The user has requested enhancement of the downloaded file.


Recent Researches in Electrical Engineering

Improvement of ISO/IEC 20000 standard through the combination with


ISO/IEC 27001
Anel Tanovic*, Asmir Butkovic **, Fahrudin Orucevic***, Nikos Mastorakis****
* Faculty of Electrical Engineering
Zmaja od Bosne bb, Sarajevo 71000, Bosnia and Herzegovina
** Police Support Agency of Bosnia and Herzegovina
Aleja Bosne Srebrene bb, Sarajevo 71000, Bosnia and Herzegovina
*** Faculty of Electrical Engineering
Zmaja od Bosne bb, Sarajevo 71000, Bosnia and Herzegovina
**** Technical University of Sofia
St.Kliment Ohridski Boulevard, Sofia 1756, Bulgaria
atanovic@etf.unsa.ba, asmir.butkovic@psa.gov.ba, forucevic@etf.unsa.ba, mastor@tu-sofia.bg

Abstract: - This paper presents the improvement of the existing ISO/IEC 20000 standard in telecommunication
industry by using the combination with ISO/IEC 27001 standard. The aim of this research is to integrate all
security benefits from ISO/IEC 27001 into the existing Information Security Management process which is the
part of ISO/IEC 20000 standard. For the reference model is taken the IPTV system from one Middleware
vendor from United Kingdom. The result of the work is the improved ISO/IEC 20000 standard which can be
implemented in any buisiness environment. The paper has also the professional contribution because it
describes the process of the improvement of one real IPTV system for telecom operators.

Key-Words: - ISO/IEC 20000, ISO/IEC 27001, IPTV system, Telecom Operator.

1 Introduction Middleware vendor from United Kingdom. Section


This paper presents the research connected to the V. shows the improved model of ISO/IEC 20000
improvement of ISO/IEC 20000 standard. ISO/IEC standard and comparison of results before the
20000 standard describes the implementation of IT implementation and after the implementation of new
Service Management System and it is based on ITIL ISMS system. Section VI. is the conclusion of the
recommendations. Information security is also one paper in which are described all advantages from a
topic which is today very interesting for every new developed model of ISO/IEC 20000 standard.
company. ISO/IEC 20000 has one process which This paper should increase the awareness of all
name is Information Security Management and companies on the importance of implementation of
which has only basic functions [3], [4], [5]. On the IT Service Management frameworks and standards.
other side, we have ISO/IEC 27001 which is Especially it is important in the field of the
responsible for the design, implementation and information security so this is the reason why this
maintenance of Information Security Management paper gets on importance because here we produced
System. This standard contains 113 security controls a new version of ISO/IEC 20000 standard which has
which explain in details the process of Information new recommendations from information security
Security Management System design and field.
implementation. The aim of this paper is to improve
the existing ISO/IEC 20000 standard by taking all 2 Basic concepts for ISO/IEC 20000
advantages from ISO/IEC 27001 standard and to ISO/IEC 20000-1:2011 represents the standard
improve the existing Information Security responsible for planning, establishing,
Management process. implementing, operating, monitoring, reviewing,
Section II. describes the process of design of IT maintaining and improving a Service Management
Service Management System by taking ISO/IEC System (SMS). The requirements include the
20000 standard. Section III. describes the process of design, transition, delivery and improvement of
design of Information Security Management System services to fulfil agreed service requirements [3],
by taking ISO/IEC 27001 standard. Section IV. [4], [5]. This standard can be used by:
shows the reference model used for this research  An organization seeking services from
which is basically the IPTV system produced by one service providers and requiring assurance

ISBN: 978-960-474-392-6 111


Recent Researches in Electrical Engineering

that their service requirements will be broad spectrum of inter-business activities


fulfilled related to providing and consuming
 An organization that requires a consistent knowledge and services via networks [5].
approach by all its service providers, 8. Supplier Management is process of of
including those in a supply chain strategically planning for, and managing, all
 A service provider that intends to interactions with third party organizations
demonstrate its capability for the design, [3].
transition, delivery and improvement of 9. Incident and Service Request Management
services that fulfil service requirements – This process is responsible for
 A service provider to monitor, measure and categorization, prioritetization and solving
review its service management processes all different kind of incidents and user
and services requests [4].
 A service provider to improve the design, 10. Problem Management – This process is
transition, delivery and improvement of responsible for categorization,
services through the effective prioritetization and solving all different kind
implementation and operation of the SMS. of problems [3].
11. Configuration Management – This is
ISO/IEC 20000 consists of 13 processes (figure a systems engineering process for
1.): establishing and maintaining consistency of
1. Capacity Management – This process aims a product's performance, functional and
to ensure that the capacity of IT services physical attributes with its requirements,
and the IT infrastructure is able to deliver design and operational information
the agreed service level targets in a cost throughout its life [5].
effective and timely manner [4]. 12. Change Management – This process
2. Service Continuity & Availability monitors all changes between all
Management ensures which plans should be organizational units inside one individual
put in place and managed to ensure that IT company [3].
Services can recover and continue with a 13. Release and Deployment Management –
serious incident occur. This process also This process aims to build, test and deliver
defines all time periods in which services services to the customer [4].
should be available [3].
3. Service Level Management – This process 3 Basic concepts for ISO/IEC 27001
defines three types of contracts: Service ISO/IEC 27001 formally specifies an
Level Agreements (contracts with Information Security Management System (ISMS),
customers), Operation Level Agreements a suite of activities concerning the management of
(contracts between different organization information security risks. The ISMS is an
units) and Contracts (contracts with overarching management framework through which
suppliers) [5]. the organization identifies, analyzes and addresses
4. Service Reporting – This process is its information security risks [10]. The ISMS
responsible for the preparement of different ensures that the security arrangements are fine-tuned
types of reports connected to the strategic to keep pace with changes to the security threats,
management decisions in the company [4]. vulnerabilities and business impacts (figure 2.). The
5. Information Security Management – It standard covers all types of organizations (e.g.
specifies the requirements for establishing, commercial enterprises, government agencies, non-
implementing, operating, monitoring, profits), all sizes (from micro-businesses to huge
reviewing, maintaining and improving of multinationals), and all industries or markets (e.g.
information security in the organization [4]. retail, banking, defense, healthcare, education and
6. Budgeting & Accounting for services – The government). The most important for the
aim of budgeting and accounting for IT implementation of this standard are security controls
services is to budget for and provide which contain all necessary information related to
documentary evidence of the costs for the important facts of the security. The organization
service provision [3]. needs to implement all security controls to become
7. Business Relationship Management – This certified according to the ISO/IEC 27001 [9], [10].
process is a formal approach to It contains 113 security controls which are divided
understanding, defining, and supporting a in 14 groups:

ISBN: 978-960-474-392-6 112


Recent Researches in Electrical Engineering

 A.5: Information security policies (2 IPTV system provides total head-end to enable
controls) communication - broadcasting convergence service,
 A.6: Organization of information security (7 which provides broadcasting or moving picture
controls) contents and information to TV through IP network.
 A.7: Human resource security - 6 controls Centralized STB management from head-end is
that are applied before, during, or after possible [7].
employment Some options which are included in IP STB
 A.8: Asset management (10 controls) which are supported by this system:
 A.9: Access control (14 controls)  Supporting a variety of codec, such as
 A.10: Cryptography (2 controls) WMV and MPEG 1/2/4 as well as H.264
 A.11: Physical and environmental security  Supporting push (download) type VOD
(15 controls) service linked to head-end
 A.12: Operations security (14 controls)  Simultaneous play function while
 A.13: Communications security (7 controls) downloading contents
 A.14: System acquisition, development and  Real-time streaming function
maintenance (13 controls)  Providing convenient GUI screen through
 A.15: Supplier relationships (5 controls) middleware and browser
 A.16: Information security incident  Supporting Internet connection function by
management (7 controls) using wired and wireless media
 A.17: Information security aspects of  A variety of video outputs including
business continuity management (4 composite, component, S-Video and HDMI
controls)  Audio output, such as analog audio and
 A.18: Compliance; with internal SPDIF, etc.
requirements, such as policies, and with  Digital TV tuner (optional)
external requirements, such as laws (8  Supporting a variety of interfaces, such as
controls) WLAN, HDMI and USB, etc.
 Upgraded remote controlling through
4 Reference model linkage to head-end.
IPTV solution is a collective term of head-end
platform, transmission network and IP STB to 5 Integration process and results
enable communication - broadcasting convergence Information Security Management process from
service that provides broadcasting, moving picture ISO 20000 will be replaced with Plan-Do-Check-
contents and information to TV through IP network Act cycle which is the basis of ISO 27001. All 113
[1]. With conversion from the conventional PC- security controls which are divided in these 14
based subscriber terminal environment to IP STB groups will be the part of a new model of ISO
base centering on TV, IPTV solution provides 20000. Figure 4. shows this integration process. All
simple and convenient control function with the use other ISO 20000 processes are unchanged. The aim
of remote controller [2]. It supports system of this integration is to see are there any differences
implementation capable of centralized STV on results for other processes after this integration.
management in head-end. Figure 3. shows IPTV Table I. contains results before the
system which is taken as the reference model for implementation with ISO 27001 standard and after
this research. the implementation with this standard. Results have
IPTV service refers to the service of transmitting showed that all ISO 20000 processes are
a variety of contents and existing TV programs to implemented with the average implementation of
service subscriber's TV connected to set top box or 76.69% before the implementation of ISO 27001
receiver by using IP (Internet protocol)-based [2]. Especially bad were implemented processes
network. In a narrow sense, it extends the scope of from Service Delivery group of processes and
additional super high-speed Internet service to Resolution processes. Information Security
provide VOD, etc. from PC to TV. In a wider Management process has achieved the result of 76%
perspective, it actively receives broadcasting of the successful implementation. Seven processes
channels in AV (audio/video) form by utilizing have achieved a positive result which is above 75%
super high-speed Internet service subscriber of the successful implementation and six processes
network as the broadcasting medium [6], [8]. were under this border.

ISBN: 978-960-474-392-6 113


Recent Researches in Electrical Engineering

Results have showed that all ISO 20000 proof that this model can be implemented in any
processes are implemented with the average business environment. Our future research in this
implementation of 81.53% after the implementation area will be connected only to the improvement of
of ISO 27001. All 13 processes have achieved now ISO/IEC 20000 in the field of information security
a positive result which is above the border of 75% and we will test a new model in all these different
of the successful implementation. Information business environments but also make a combination
Security Management process has achieved a better with some other ITSM frameworks and standards
result for almost 9% which means that the result is especially MoR, CobiT, eTOM, ISO/IEC 22301,
now 85% in total. Capacity Management has ISO/IEC 27005 and ISO/IEC 31000. This paper has
achieved a better result for 5% which is 79% in total also opened a new section of researches which
for this process, Service Continuity & Availability needs to be finished in this area and which should
Management has achieved a better result for 10% produce a new version of ISO/IEC 20000 which
which is 81% in total for this process, Service Level should be produced directly from ISO International.
Management has achieved a better result for 13%
which is 78% in total for this process, Supplier References:
Management has achieved a better result for 8% [1] J.H. Deutscher and C. Felden, “Model Concept
which is 76% in total for this process, Incident and to Determine the Optimal Maturity of IT
Service Request Management has achieved a better Service Management Processes”, 8th
result for 9% which is 78% in total for this process International Conference on Computer and
and Problem Management has achieved a better Information Science (ICIS 2009), pp. 543-548,
result for 7% which is 79% in total for this process. 2009.
[2] K.Begic and A. Tanovic, “Improvement of
6 Conclusion implementation of ISO/IEC 20000 Edition 2
Results from the previous section have showed standard in IT systems of Telecom operator
that a new performed model of ISO/IEC 20000 has through the comparison with ITIL V3 best
achieved a better result for 4.84% than a previous practises”, 20th Telecommunication Forum
model. It means that functions connected to the (TELFOR), pp. 32-35, 2012.
security are not connected only to Information [3] M.Rovers, “ISO/IEC 20000:2011 – A Pocket
Security Management process but also to other Guide”, Van Haren Publishing, February 2013.
processes. ISO/IEC 27001 contains 14 different [4] M.Kunas, “Implementing Service Quality Based
security groups which influence strongly on some on ISO/IEC 20000”, ITGP, October 2012.
other processes and which are the part of this [5] D.Clifford, “Implementing ISO/IEC 20000
standard [7], [8]. These security controls include all Certification – The Roadmap (ITSM Library)”,
these topics: information security policy, Van Haren Publishing, February 2008.
organization of information security, human [6] M.Alojail and B.Corbitt, “ITIL maturity model
resource security, asset management, access of IT outsourcing: Evidence from a “leading
controls, cryptography, physical and environmental user””, 9th Iberian Conference on Information
security, operations connected to the security, Systems and Technologies (CISTI 2014), pp. 1-
communication operations connected to the security, 5, 2014.
system development, maintenance and acquisition, [7] M.Vicente, N.Gama, and M.M. da Silva, “Using
supplier relationships, information security incident ArchiMate to Represent ITIL Metamodel”, 15th
management, information security aspects Conference on Business Informatics (CBI), pp.
connected to the business continuity management 270-275, 2013.
and compliance with internal and external [8] H.B. Esmaili, H. Gardesh, and S.S.Sikari,
requirements. “Validating ITIL maturity to strategic business
A new performed model of ISO/IEC 20000 is – IT alignment”, 2nd International Conference
produced on a test environement on one IPTV on Computer Technology and Development
system which is produced in UK. Future research in (ICCTD), pp. 556-561, 2010.
this field is directed in the implementation of the [9] K.Pecina, R.Estremera, A.Bilbao, and E.Bilbao,
same improved model in other business “Physical and Logical Security management
environments which include insurance companies, organization based model on ISO 31000 and
power companies, microcredit organizations, ISO 27001”, IEEE International Carnahan
brokerage houses etc. The aim of all these different Conference on Security Technology (ICCST
researches is to confirm the validity of the new 2011), pp. 1-5, October 2011.
improved model of ISO/IEC 20000 and to get the

ISBN: 978-960-474-392-6 114


Recent Researches in Electrical Engineering

[10] K.Beckers, S.Fassbender, M.Heisel, and Reliability and Security (ARES 2012), pp. 242 –
H.Schmidt, “Using Security Requirements 248, August 2012.
Engineering Approaches to Support ISO 27001
Information Security Management Systems
Development and Documentation”, 7th
International Conference on Availability,

Figure 1. ISO/IEC 20000 process model

Figure 2. Requirements of ISO 27001 ISMS

ISBN: 978-960-474-392-6 115


Recent Researches in Electrical Engineering

Figure 3. IPTV System

Figure 4. Improved model for ISO/IEC 20000 standard

TABLE I. RESULTS BEFORE AND AFTER THE IMPLEMENTATION OF ISO 27001


ISO 20000 process Results before the Results after the
implementation of implementation of
ISO 27001 ISO 27001
Capacity Management 74% 79%
Service Continuity & Availability Management 71% 81%
Service Level Management 65% 78%
Service Reporting 84% 84%
Information Security Management 76% 85%
Budgeting & Accounting for services 81% 81%
Business Relationship Management 78% 80%
Supplier Management 68% 76%
Incident and Service Request Management 69% 78%
Problem Management 72% 79%
Configuration Management 86% 86%
Change Management 85% 85%
Release and Deployment Management 88% 88%

ISBN: 978-960-474-392-6 116

View publication stats

You might also like