The UCIT Office of Information Security (OIS) has created an Information Security Controlled Self Assessment (CSA) tool. A CSA is a powerful tool because it sets an expectation of adherence to industry best practices and policies.
This tool is intended for use within a college or business department. It asks the people directly involved in a business activity to determine whether the data protection processes in place are effective. It helps internal staff evaluate informal or subjective controls in 62 information security areas. (See example below). This tool is meant to be a self assessment that you can use in order to “rate” yourself on the standard CMM maturity scale with 0 being low (non-existent) and 5 being high (optimizing). The intent of this CSA is for you to conduct a CSA annually and seek continual improvements each year in areas of immaturity.
From an information security perspective, CSAs assist you in determining whether your organization is meeting its data protection objectives. Key advantages to implementing a CSA program include earlier detection of risk and the development of action plans that will safeguard organizational data against significant business risk. We have taken an information security Integrated Process Approach when designing this CSA template and have incorporated a blend of ITIL (IT Information Library/ISO 2000); COBIT (ISACA’s - Control Objectives for IT); and ISO 17799:270001 (International Standards Organization) processes and standards into it.
Goals of the CSA
CSA Document Downloads
Example
If you download the Self Assessment Spreadsheet above and open it, we will review one of the CSA Questions as an example. (The bullet items below the picture simply provide examples of how to fill the column templates out. The examples used are not meant to be taken as facts; as we do offer Security Awareness programs at UC)
| Question Number |
Question (Control Objective) Business Staff |
Question Number |
Question (Control Objective) IT Staff |
Answer Yes/No/Not Applicable |
Describe Existing Key Security Controls Supporting this Question |
Describe Key Weaknesses Relative to this Question |
Describe any Current Projects Relative to this |
Current Maturity Rating |
| 1 |
Are you and members of your department aware of information security policies and have you been provided with any type of awareness training or ongoing communications? | 1 | Has an information security policy framework been developed including who is responsible for development, review, and approval of policies? | NA |
The template can be used by a business person or an IT person (each question is written in both “languages”)