<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>certification - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/certification-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/certification-en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Fri, 03 Jan 2020 10:59:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>certification - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/certification-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Security certification: the key to complying with the french military programming Law (MPL)</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/07/security-certification-the-key-to-complying-with-the-french-military-programming-law-mpl/</link>
		
		<dc:creator><![CDATA[Fr@Nc0isLuqu3t]]></dc:creator>
		<pubDate>Mon, 09 Jul 2018 10:09:51 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[ANSSI]]></category>
		<category><![CDATA[audit]]></category>
		<category><![CDATA[certification]]></category>
		<category><![CDATA[MPL]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[risk analysis]]></category>
		<category><![CDATA[VIIS]]></category>
		<category><![CDATA[VOI]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10951/</guid>

					<description><![CDATA[<p>Security certification, taking a risk-bases approach to ISS Under the French Military Programming Act (MPL), certification is a mandatory procedure that applies to Vitally Important Operators (VOI). It helps to manage the issues and security levels for all Vitally Important...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/07/security-certification-the-key-to-complying-with-the-french-military-programming-law-mpl/">Security certification: the key to complying with the french military programming Law (MPL)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Security certification, taking a risk-bases approach to ISS<strong><br />
</strong></h2>
<p>Under the French Military Programming Act (MPL), certification is a mandatory procedure that applies to Vitally Important Operators (VOI). It helps to manage the issues and security levels for all<strong> Vitally Important Information Systems (VIIS)</strong></p>
<p>Certification is a core issue to the MPL compliance strategy, because it provides <strong>a concrete and operational means of breaking down the MPL’s requirements</strong> while reducing security risks.</p>
<p>ANSSI—The French National Cybersecurity Agency—has produced a guide that describes the key steps in certification. These steps are:</p>
<ul>
<li>Defining a certification strategy (a scoping document describing how to achieve certification)</li>
<li>Performing a risk analysis on a VIIS</li>
<li>Conducting a certification audit</li>
<li>The certification decision</li>
<li>Post-certification monitoring</li>
</ul>
<p><strong>The approval decision must be made by the Certification Authority (CA), </strong>which is the legal entity responsible for certifying VIIS. It is assisted by the Certification Commission, an internal group of experts responsible for doing the preparatory work for the certification decision.</p>
<p>The information required to make the decision is compiled in the certification file. This allows the Certification Commission to attest to the level of security and accept the residual risks. Ultimately then, it is the Certification Commission that attests to the fact that the risks are being properly managed.</p>
<h2>An approach to quickly assess existing VIIS<strong><br />
</strong></h2>
<h3>Retro-certification: how to certify VIIS already in production</h3>
<p>For existing VIIS, the certification model is different, although the objectives remain the same. An assessment of existing VIIS is the starting point for certification, and performing <strong>a dry-run audit (or using a previous audit report)</strong> serves to speed up the gathering of information and the identification of risks.</p>
<p>Conversely, the security measures have to be applied to a history that can be challenging to transpose. <strong>Compensatory measures</strong> therefore have to be identified, prioritized, and implemented.</p>
<p>This retrospective certification, or retro-certification, must enable <strong>the business to consider the risks in an exhaustive fashion, and prioritize the actions,</strong> in order to reduce them to an acceptable level by making the necessary investments.</p>
<p>While it’s important to design the certification process such that it has the capacity to process future VIIS, <strong>it is mostly for existing VIIS that VOI are actually busy with,</strong> and retro-certification is, therefore, a priority.</p>
<h3>Adopting a test &amp; learn approach</h3>
<p>In order to define and deploy a certification procedure within the framework of the MPL, VOI can <strong>define an initial pilot stage</strong> to test and refine the process before using it—at full scale—on a VIIS.</p>
<p>The objective of this pilot phase is to <strong>compare the methodology and the reality on the field</strong>, with the aim of validating the approach and the steps defined (procedures, people who need to be involved, etc.). Taking such approach highlights areas of difficulty (related to IS administration, partitioning, patch management, etc.), and enables <strong>a concrete and achievable remediation plan </strong>to be put together.</p>
<p>The choice of pilot VIIS is essential in<strong> anticipating the problems that will be encountered.</strong> It makes sense to choose a pilot VIIS that is representative of all the other VIIS (typical size, limited interactions, etc.).</p>
<h3>Demonstrating the security level generated by the MPL</h3>
<p>Among the various work streams and projects triggered by the MPL, it’s the certification program that enables <strong>security to be strengthened effectively</strong>. This can be achieved not just by <strong>highlighting</strong> security at high level both internally (with senior management and those with accountability for certification) and externally (with ANSSI and the government), but also by <strong>quantifying the degree of risk reduction</strong> required (through risk analysis) and achieved (through audit).</p>
<p>Achieving certification enables <strong>actual risks to be communicated</strong>, and <strong>the players involved</strong> to be made responsible and aware (particularly senior management—as a result of interactions with those accountable for certification).</p>
<p>All the activities undertaken for MPL compliance are compiled in a <strong>certification file,</strong> which gives them a practical reality. This includes observations about security, obstacles encountered, and an overview of the complexity involved in compliance.</p>
<p>The certification file must be made <strong>available to ANSSI.</strong> The file represents a showcase for ANSSI with respect to the VOI&#8217;s compliance with the MPL—and it pays not to cut corners! The VOI must demonstrate the gains made in security and the clear validation of the theoretical responses to compliance.</p>
<h2>Maintaining a high level of security over time<strong><br />
</strong></h2>
<h3>Creating a certification mindset</h3>
<p>Certification doesn’t end when the certification decision has been made and the system put into production. This only marks the start of the risk-management process. It’s then a question of maintaining momentum, increasing visibility, and ensuring the ongoing management of security. Certification must be renewed at least <strong>every three years,</strong> or during <strong>periods of major change to the VIIS, something that forces a reconsideration of whether the VIIS is actually secure</strong> in the way described in the risk analysis.</p>
<p>Therefore, for an existing VIIS, a process needs to be set up to monitor and identify security-related changes to it. This must be carried out in the context of an organizational structure, for example with <strong>a named person holding the responsibility to identify and assess any changes.</strong> This person, can, in particular, establish a <strong>list of key events</strong>, for example: changes to the level of exposure of the VIIS, the arrival of new Service Providers, functional developments in the VIIS, or modifications to infrastructure or operational management); these will provide a basis for assessing any requirements for the system to be overhauled.</p>
<p>The establishment of a certification governance committee ensures <strong>a degree of momentum in the certification process.</strong> Updating the methodology for integrating security into projects enables new projects to be taken into account, risk management to be applied from the beginning, and advance preparation for VIIS compliance.</p>
<h3>Providing a clear and understandable framework for application owners</h3>
<p>Application owners are key players in maintaining security and certification over time. This is not just because they have a good overview of their VIIS, but also because they are aware of developments to it. If their attitude is one of fear of the MPL, this can lead to a poor approach to security. Conversely, a <strong>good understanding of MPL issues</strong>, certification, and continuous improvement, can enhance VIIS security.</p>
<p>Special attention should be paid to <strong>supporting application owners, and raising their awareness about security</strong> in general, and the certification process in particular. To achieve a win-win approach, and improve security over time, you must bring application owners together and get their buy-in.</p>
<h2>Security certification: an approach that enhances risk management over time<strong><br />
</strong></h2>
<p>Beyond essential regulatory requirements, the MPL has to be seen as a catalyst that can <strong>enhance risk management within a VOI:</strong> from operational level, through application owners, right up to the senior management.</p>
<p>After taking the first step of overhauling and implementing risk-reduction measures on an existing VIIS, certification ensures that levels of security are maintained right across it. Given this, it’s vital that <strong>the players involved remain engaged over time</strong> to ensure that the initial momentum is maintained.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/07/security-certification-the-key-to-complying-with-the-french-military-programming-law-mpl/">Security certification: the key to complying with the french military programming Law (MPL)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Certifications : CISA, la caverne d’Ali Baba des auditeurs et consultants informatiques ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2013/07/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques/</link>
		
		<dc:creator><![CDATA[Florence Collins]]></dc:creator>
		<pubDate>Mon, 08 Jul 2013 06:55:14 +0000</pubDate>
				<category><![CDATA[Métiers - Stratégie & projets IT]]></category>
		<category><![CDATA[certification]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[COBIT]]></category>
		<category><![CDATA[ISACA]]></category>
		<category><![CDATA[ITIL]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=3882</guid>

					<description><![CDATA[<p>Le CISA® (Certified Information Systems Auditor) est un certificat international délivré par l’ISACA (Information System Audit and Control Association). Il atteste de la maîtrise  de la gouvernance, du management et du suivi des risques informatiques. Cette certification concerne plus de...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/07/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques/">Certifications : CISA, la caverne d’Ali Baba des auditeurs et consultants informatiques ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Le CISA® (Certified Information Systems Auditor) est un certificat international délivré par l’<a href="http://www.isaca.org/french/Pages/default.aspx" target="_blank">ISACA </a>(Information System Audit and Control Association). Il atteste de la maîtrise  de la gouvernance, du management et du suivi des risques informatiques. Cette certification concerne plus de 100 000 professionnels IT dans plus de 160 pays.</em></p>
<h2> CISA<em>®</em>, culture IT par excellence</h2>
<p>Le CISA<em>®</em> est un recueil des meilleures pratiques en matière de Gouvernance, Management et Suivi des risques IT. Il couvre tous les domaines de l’Audit des Systèmes d’Information, des plus techniques aux plus organisationnels :</p>
<p>&#8211; Processus d’audit des systèmes informatiques,</p>
<p>&#8211; Gouvernance des SI,</p>
<p>&#8211; Gestion du cycle de vie et de l&#8217;infrastructure des systèmes,</p>
<p>&#8211; Fourniture et support des services,</p>
<p>&#8211; Protection des avoirs informatiques,</p>
<p>&#8211; Plan de continuité et de secours informatique.</p>
<p>Ce n&#8217;est bien sûr pas la seule certification existante &#8211; mais ce label représente depuis 1978 un certificat de référence dans le monde anglo-saxon, qui en fait un critère de recrutement et de promotion pour tous les professionnels chargés de veiller à ce que les technologies et systèmes de l&#8217;entreprise soient convenablement contrôlés, suivis et évalués : auditeurs, directeurs sécurité, directeurs informatiques, directeurs des risques, consultants informatiques, etc.</p>
<h2>Quel développement en France ?</h2>
<p>Posséder ce certificat offre une reconnaissance à l&#8217;international &#8211; mais alors que l’on compte plus de 35000 professionnels CISA<em>®</em> dans le monde, seuls 300 d’entre eux seraient français, d’après le site web de l’AFAI (Association Française d’Audit et de Conseil Informatiques). Alors, pourquoi ce certificat n’est-il pas plus diffusé en France ?</p>
<div>
<p>Doit-on voir un obstacle culturel à son adoption ? Pour un français, il n’existe pas qu&#8217;une seule « bonne » façon de faire les choses : les bonnes pratiques ont des limites, en fonction des contextes et les maturités observés. Le QCM, qui permet de valider la certification, est ainsi souvent décrié pour valoriser un apprentissage &#8220;par cœur&#8221;, sans réflexion.</p>
<p>Ou doit-on y voir  plutôt la conséquence du lourd investissement en temps nécessaire ? En effet,la connaissance fine du référentiel associé au CISA<em>®</em> et sur lequel reposent une bonne partie des questions de l’examen, le COBIT<em>®</em> (Control OBjectives for Information and related Technology), nécessite plus que quelques heures de formation.</p>
<p>Et bien non. La raison principale n’est évidemment ni culturelle, ni liée à l’investissement nécessaire, mais plutôt à une méconnaissance de ce certificat dans les pays non anglo-saxons. Et c’est dommage, parce que le CISA® apporte de vrais avantages !</p>
<h2>Le CISA<em>®</em>, une vision métier de l’IT</h2>
<p>La mise en œuvre des bonnes pratiques du CISA<em>®</em> permet d&#8217;acquérir certains réflexes qui représentent un fort retour sur investissement, puisqu’ils offrent la possibilité d’améliorer la maîtrise du SI en interne, tout en délivrant une forte valeur ajoutée au métier.</p>
<p>Le plus intéressant peut-être pour nos entreprises françaises, c’est l’accent porté par ce référentiel sur cette vision métier. En effet, les anglo-saxons n’oublient jamais que, dans l’entreprise,  on ne fait jamais de l&#8217;IT « par amour de l’art » mais pour servir des vrais besoins business…</p>
<h2>COBIT<em>®</em>, la boîte à outil du CISA<em>®</em></h2>
<p>En dehors de cette vision métier apportée par le CISA<em>®</em>, son référentiel appliqué, COBIT <em>®,</em>est devenu  le référentiel de référence en matière de  maîtrise des processus et activités du système d’information. Son périmètre reprend en particulier celui des référentiels suivants :</p>
<p>&#8211; ISO 27001 pour la sécurité (depuis la version v5 du COBIT<em>®)</em>,</p>
<p>&#8211; ITIL pour la gestion des services IT,</p>
<p>&#8211; CMMI pour la maturité des processus IT.</p>
<p>Il propose un certain nombre d’indicateurs, de processus, de facteurs clés de succès et de bonnes pratiques pour aider les entreprises à tirer parti au maximum de leur système d’information.</p>
<p>A l’heure où les entreprises sont de plus en plus soumises à un environnement règlementaire et technologique complexe, la certification CISA® offre un avantage concurrentiel fort. Elle permet de devenir un acteur actif du changement IT, maîtrisant les bonnes pratiques, sachant identifier et réduire les risques IT, tout en restant conscient des besoins business en matière d&#8217;IT.</p>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/07/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques/">Certifications : CISA, la caverne d’Ali Baba des auditeurs et consultants informatiques ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
