IT Governance For SME
IT Governance For SME
IT Governance For SME
Peter Josi 1
IT Governance for SME
Table of Content
1. Principles ................................................................................................................................ 3
2. Components ........................................................................................................................... 4
3. Processes ................................................................................................................................ 7
4. Lifecycle ................................................................................................................................ 28
5. Benefits ................................................................................................................................. 32
Peter Josi 2
IT Governance for SME
1. Principles
The principles outline the characteristics of the framework and determine the scope of the framework
regarding the applicability and the operational area.
1.1 Self-Empowerment
The framework is simple and easy to understand. This makes it possible that the implementation can
be made by the company on its own, without special knowledge or external consulting necessary. The
framework comes with a built-in lifecycle and an assessment which facilitates the implementation process
by providing a step-by-step guidance.
The design of the framework is structured in a way that it fits well into the existing structures and
processes. Although processes are proposed, it does not automatically mean that these processes have
to be adopted in order to reach satisfactory results. The main objective of the segmentation into processes
is that the described tasks are logically structured and can be assigned to an existing role or person in the
company.
1.3 Compatibility
Since there are already numerous frameworks in the area of IT Governance, it is not reasonable to
develop a distinct framework. This Framework is based on COBIT 5, but has been tailored for the needs
for small and medium-sized enterprises. This approach ensures compatibility and extendibility.
Companies that have implemented this framework can easily upgrade to COBIT 5 by consulting the
provided COBIT 5 mapping in chapter 5.3. The mapping reveals the COBIT 5 processes that are included
in this framework.
Peter Josi 3
IT Governance for SME
2. Components
The framework is divided into three layers, depicted in in a pyramid. The layers separate the domains
regarding their importance for a company master the daily business. The form of the pyramid graphically
expresses the level of importance that the layer has regarding to master the daily business.
Usually, incidents at the bottom layer have great impact on daily business processes. Running backup
and recovery processes or a well-protected infrastructure is vital for the business. The layer Ensure
Continuity contains all key processes that are necessary for solid and stable provisioning of IT services.
The middle layer consolidates the planning and administrative tasks. Its main purpose is that IT services
are effectively managed and that IT divisions move from reactive to proactive management. Optimization
within the IT department is the intention of the top layer.
The domains are logically detached and the processes within the domains illustrate real-live processes
in a common IT operations department, based on a functional separation.
Peter Josi 4
IT Governance for SME
In the following, each process is described in detail. Every process consists of a process goal,
enumeration and explanation of tasks and prescribes the necessary attributes that should be produced
or maintained. To enable monitoring functionalities, each process provides metrics that can be traced.
Additionally, best practices are provided.
Peter Josi 5
IT Governance for SME
Peter Josi 6
IT Governance for SME
3. Processes
As already mentioned, this framework is tailored out of COBIT 5 for the needs of small and medium-
sized enterprises. The content of the processes has been mainly taken out of the respective COBIT 5
processes (see the provided mapping in chapter 5.3). Where necessary, some minor changings have been
made.
Peter Josi 7
IT Governance for SME
3.1.2 Tasks
DP01.T01 Backup
Backup systems, applications, data and documentation according to a defined schedule. The following
considerations should be taken into account:
Best Practice
Systems are usually backed up by creating images whereas data is backed up with file-based
backup routines. It is common to apply a grandfather-father-son backup policy for most backup
objects. This backup technique stores full copies of the backup source on a monthly basis,
incremental backups on a weekly basis and differential backups on a daily basis. This approach
ensures that any state can be restored, depending on the retention policy.
Backups should be stored on a secure location and ideally not the same location as the data
source whilst ensuring a fast recovery processes. It is recommended to use dual-destination
backup to encounter this challenge. Dual destination backup allows storing backup objects on two
(physically separated) locations. The first location should be quickly accessible in case of recovery
and the second location should satisfy the demand of a secure backup location (e.g. backup in the
cloud or in another company site).
Compliance with external laws and regulations must be adhered. Be aware that for some
industries (e.g. health) there are special requirements for data retention.
Peter Josi 8
IT Governance for SME
Best Practice
Validation and testing is a vital task to ensure the quality of the backup. It may happen that
backup objects cant be restored, for what reason ever, and proper and regular testing is essential
to perceive this misconduct. Whilst the restoration testing of data is a rather trivial process,
restoration testing of systems and applications is difficult because of the required peripheral
system that is necessary to check the functionality. The setup of virtual system environments has
proven to be an efficient way for restoration testing of systems and applications.
3.1.3 Artifacts
3.1.4 Metrics
DP01.M01 Percent of backup files transferred and stored securely
DP01.M03 Number of recovery exercises and tests that have achieved recovery objectives
Peter Josi 9
IT Governance for SME
3.2.2 Tasks
Best Practice
Maintain user access rights in accordance with business function and process requirements. Align
the management of identities and access rights to the defined roles and responsibilities, based on
least-privilege, need-to-have and need-to-know principles.
Manage user access lifecycle from creation of user account, to modifications and deletion
(especially with trainee-accounts) and perform regular management review of all accounts and
related privileges.
Clear policies help to improve the security standard and raise the security awareness. A user
policy should provide helpful information for users on how to behave and how to deal with
security threats.
3.2.3 Artifacts
3.2.4 Metrics
SEC01.M01 Percent of stakeholders who understand policies
Peter Josi 10
IT Governance for SME
3.3.2 Tasks
Best Practice
The management of malware solutions and system updates is centralized, enabling reporting
functionalities that permit better pro- and reactive measures in case of a security incident.
The hardening of endpoints is another useful security measure. The following reflections should be
taken into account (not conclusive):
Configure operating systems in a secure manner (e.g. local administrator rights)
Implement device lockdown mechanisms.
Manage remote access and control. (e.g. VPN)
Provide physical protection of endpoint devices.
Dispose of endpoint devices securely.
Peter Josi 11
IT Governance for SME
Best Practice
Nowadays, network devices offer a wide range of possibilities to face cyber security. Unified
Thread Management (UTM) has proven to be an efficient measure to protect the local network and
has become affordable not only for large enterprises. The following principles should be adopted:
Allow only authorized devices to have access to corporate information and the enterprise
network. Configure these devices to force password entry.
Implement network filtering mechanisms such as firewalls and intrusion detection software with
appropriate policies to control inbound and outbound traffic.
Encrypt information in transit according to its (implicit or explicit) classification.
Apply approved security protocols to network connectivity.
Configure network equipment in a secure manner.
Carry out periodic penetration testing to determine adequacy of network protection.
Carry out periodic testing of system security to determine adequacy of system protection.
3.3.3 Artifacts
3.3.4 Metrics
SEC02.M01 Number of vulnerabilities discovered
Peter Josi 12
IT Governance for SME
3.4.2 Tasks
Best Practice
Manage the requesting and granting of access to the computing facilities. Formal access requests
are to be completed and authorized by management of the IT site, and the request records
retained. The forms should specifically identify the areas to which the individual is granted access.
Ensure that access profiles remain current. Base access to IT sites (server rooms, buildings, areas
or zones) on job function and responsibilities.
Require visitors to be escorted at all times while onsite by a member of the IT operations group.
This is hard to implement in small and medium-sized enterprises and depends on several factors
(e.g. level of trust to the visitor, purpose of the task).
Conduct regular physical security awareness training.
3.4.3 Artifacts
3.4.4 Metrics
SEC03.M01 Number of physical-security related incidents
Peter Josi 13
IT Governance for SME
3.5.2 Tasks
Best Practice
Identify potential scenarios likely to give rise to events that could cause significant disruptive
events. These events should then be classified regarding the time of disruption in case of failure
and their importance. The importance is often determined through the maximal tolerable outage.
The time required to recover should also be taken into consideration.
Identify measures that will reduce the likelihood through prevention and determine cost-effective
measures that are to be taken in case of an incident. These procedures should be well
documented so that in case of a disruptive event, a structured course of action can be taken.
Clear roles and responsibilities for each measure must exist.
Best Practice
The testing of the continuity plan has multiple purposes. First you want to be sure that the
defined measures work as desired (verification). Secondly, staff is getting trained in dealing with
exceptional situations (learning) and last but not least, the procedures can be optimized by
accomplishing continuity tests (optimization).
3.5.3 Artifacts
3.5.4 Metrics
CON01.M01 Number of critical business systems not covered by the continuity plan
CON01.M04 Percent of executed business continuity exercises that have achieved its objectives
Peter Josi 15
IT Governance for SME
3.6.2 Tasks
Best Practice
Assess availability, performance and capacity of it services and resources and determine the
baselines. The assessment should consider the current and forecasted requirements. The
following criteria should be considered:
Customer requirements
Business priorities and objectives
Budget impact
Resource utilization
IT capabilities and industry trends
Ensure periodic monitoring (or where possible automated) and implement appropriate alerting
functionalities (e.g. free disk space).
Plan, prioritize availability, performance and capacity implications of changing business needs and
service requirements.
3.6.3 Artifacts
Peter Josi 16
IT Governance for SME
3.6.4 Metrics
CON02.M01 Percent of unplanned capacity, performance or availability upgrades versus planned
upgrades
Peter Josi 17
IT Governance for SME
3.7.2 Tasks
Best Practice
Ensure that all changes are conducted in a structured way. The following considerations should
be taken into account (a simple form is enough):
Impact assessment
Prioritization and authorization
Emergency changes,
Tracking
Reporting
Closure and documentation
All changes should be coordinated centrally through one consistent person, so that holistic
overview is ensured. This is vital to recognize possible dependencies.
Best Practice
Suitable testing of scheduled changes helps to verify that the solution will operate successfully in
the live environment and delivers the intended results.
Create a test plan and ensure that the test procedures should simulate real-world conditions.
For critical applications it is recommended to temporarily set up mirrored environments where
the real environment can be simulated at a very high degree of similarity. Note that not
everything can be simulated and that a certain residual risk will remain.
Make sure that the test results are logged.
Peter Josi 18
IT Governance for SME
3.7.3 Artifacts
3.7.4 Metrics
CON03.M01 Percent of unsuccessful changes due to inadequate impact assessments
Peter Josi 19
IT Governance for SME
3.8.2 Tasks
Best Practice
Identify all assets and maintain alignment with the change- and configuration management.
Verify the existence of all owned assets by performing regular physical and logical inventory
checks and reconciliation.
Source, receive, verify, test and record all assets in a controlled manner, including physical
labeling, as required.
Best Practice
Define and agree on the scope and level of detail for configuration management.
Establish and maintain a logical model of the services, assets and infrastructure and how to
record configuration items and the relationships amongst them. A good point to start is a drawing
of the system landscape that proves a good overview by naturally selecting the level of detail.
Periodically verify live configuration items against the configuration repository by comparing
physical and logical configurations.
Peter Josi 20
IT Governance for SME
3.8.3 Artifacts
List of all IT assets with information about procurement, maintenance and disposal (e.g.
warranty information).
3.8.4 Metrics
CM01.M01 Number of assets not utilized
Peter Josi 21
IT Governance for SME
3.9.2 Tasks
Best Practice
Maintain a register of all purchased software licenses and associated licenses agreements.
On a regular basis, conduct an audit to identify all instances of installed licensed software. Decide
whether there is a need to retain or terminate licenses in case of dissimilarities.
3.9.3 Artifacts
The management of software licenses (contact information, license keys and agreements)
An actual overview about the current status
3.9.4 Metrics
CM02.M01 Percent of used licenses against paid-for licenses
Peter Josi 22
IT Governance for SME
3.10.2 Tasks
Best Practice
Consider the current enterprise environment and business processes, as well as the external
environment of the enterprise (industry drivers, relevant regulations, basis for competition) for
the future direction.
Identify key stakeholders and obtain insight on their requirements. Then, identify and analyze
sources of change in the enterprise and ascertain priorities.
Make sure that the future direction is controlled / revised regularly
Best Practice
Define a road map based on the results of SP01.T01. Determine dependencies, overlaps,
synergies and impacts amongst initiatives.
Identify resource requirements, schedule budgets for each of the initiatives.
3.10.3 Artifacts
3.10.4 Metrics
SP01.M01 Percent of projects that can be directly traced back to the strategy
Peter Josi 23
IT Governance for SME
3.11.2 Tasks
Best Practice
Create and maintain portfolios of IT-enabled investment programs, IT services and IT assets,
which form the basis for the current IT budget and support the road map.
On a regular basis, monitor and optimize the performance of the IT-portfolio to exploit synergies,
eliminate duplication between programs and identify and mitigate risk.
Best Practice
3.11.3 Artifacts
SP02.A01 IT-Portfolio
The IT-Portfolio should cover:
Peter Josi 24
IT Governance for SME
3.11.4 Metrics
SP02.M01 Number of running initiatives
Peter Josi 25
IT Governance for SME
3.12.2 Tasks
Best Practice
3.12.3 Artifacts
3.12.4 Metrics
CI01.M01 Number of incidents causing disruption to business-critical processes
Peter Josi 26
IT Governance for SME
3.13.2 Tasks
Best Practice
Establish and maintain a knowledge database (e.g. Wiki). Define documentation standards.
Ensure user training and increase user awareness through training and sensitization.
3.13.3 Artifacts
3.13.4 Metrics
CI02.M01 Level of satisfaction of users
Peter Josi 27
IT Governance for SME
4. Lifecycle
The lifecycle provides good guidance for implementing the framework. It is based on a continual
improvement process where first, the current situation is assessed, then the desired state is defined and
the necessary measures are taken. In the last step of the cycle, the defined initiatives are implemented.
IT governance cannot be implemented within a big-bang approach but needs to emerge slow and
steadily.
A governance-aware enterprise culture is the foundation for successful implementation.
Management support is vital for the success.
Provided that these preconditions are covered, implementation proposals can begin.
Figure 5: Lifecycle.
Peter Josi 28
IT Governance for SME
4.1 Assess
The primary goal of the assessment phase is to conduct an analysis of the current maturity regarding
IT governance tasks. The maturity-check provided within the framework (it-governance-for-
sme.ch/maturity-check) offers an easy way to initially assess the current situation. It is also helpful
because by replying the questionnaire all relevant IT topics pop up and the assessor automatically
becomes confronted with practically relevant interrogations. In the best case the accomplishment of the
maturity-check not only helps to determine the actual state but already sensitizes the company regarding
the most important IT governance topics. Another advantage of the maturity-check is that the assessor
already starts working with the framework and thereby learns to know the structure of the framework
from the bottom. The following picture illustrates the result of an example assessment. Each process is
filled with the respective color that was calculated from the indications of the questionnaire. Red means
that the assessed process maturity is insufficient, orange indicates a little better process maturity and the
light green states that the process maturity is sufficient but there is still some room for improvement. The
dark green means that the process is implemented with a high process maturity.
Peter Josi 29
IT Governance for SME
Once the maturity-check is done, the results must be analyzed. It is therefore vital to study the
framework and the proposed tasks, artifacts and metrics and already trying to make some linkage
between the framework and the real-life situation.
An assessment-report is the final delivery of this phase. It contains the findings from the maturity-
check as well as the subsequent analysis. The main purpose of this document is that the weaknesses are
clearly addressed so that it can serve as a base for decision making.
4.1.1 Artifact
Assessment-Report
4.2 Plan
In the planning phase, the desired state is defined and, with help of the assessment-report, an
implementation plan is set up. It is of great importance that the desired result is clear to everyone. The
desired result can be expressed with help of the assessment-report and the described artifacts in the
framework.
The implementation plan should consolidate all scheduled activities. For all activities, the following
information must be provided:
Goal
Priority
Result (e.g. process or artifact)
Time horizon
Responsible person(s)
Estimated implementation cost
Estimation of required manpower
This proceeding ensures a structured approach and enables monitoring and control of the
implementation progress. Prioritization should be with regards to the severity of the discovered weakness
during the assessment phase and the estimated overall expenditures. After the implementation-plan is
elaborated, it must be reviewed and approved by the management.
4.2.1 Artifact
Implementation-Plan
Peter Josi 30
IT Governance for SME
4.3 Implement
The implementation consists of the three main steps execute, monitor and review. The execution of
the activities happen according to the implementation plan and regular monitoring activities ensure the
implementation success. After completion, the result of the activity is reviewed and an overall
implementation-report concludes the implementation phase.
4.3.1 Artifact
Implementation-Report
Peter Josi 31
IT Governance for SME
5. Benefits
This chapter lists the benefits for small and medium-sized enterprises of using this framework.
5.1 Usability
This framework has been specifically developed for small and medium-sized enterprises. Whereas the
content within the prescribed processes is tailored from COBIT 5 and therefore does not differ much
(where an equivalent process is existent in this framework), organizational recommendations such as
roles and responsibilities or the implementation guidance have not been adopted. Just from a rational
perspective it would not be reasonable to apply the provided roles and responsibilities from COBIT. The
organization of small and medium-sized enterprises simply does not allow such a setup. This framework
does not provide any role or responsibility. The company is absolutely free in deciding its organizational
structure and the framework can be implemented regardless of the organizational and operational
structure. Although COBIT does not prescribe an organizational structure by defining the roles and
responsibilities, the quantity of the described roles make an implementation within a small and medium-
sized enterprise nearly impossible. The lightweight design of this framework enables maximal flexibility.
Peter Josi 32
IT Governance for SME
5.2 Compliance
Compliance with external laws and regulations can be improved by applying this framework. It does
not mean that the framework solves all challenges regarding compliance but the better each process is
implemented, the more probable it is that the compliance requirements are fulfilled. According to
Grnendahl et al. (Das IT-Gesetz: Compliance in der IT-Sicherheit, 2012, p. 13), IT governance helps to
improve the awareness regarding IT compliance issues. Additionally, clearly structured IT processes
provide a good overview across the IT landscape which eases to address compliance topics.
The following figure maps the processes within this framework with COBIT 5.
Peter Josi 33
IT Governance for SME
Peter Josi 34
IT Governance for SME
5.4 Holism
IT governance can be considered to be the rooftop of all IT processes within the enterprise. It is
therefore important that an IT governance initiative covers all relevant aspects of IT.
The IT governance focus areas defined by the IT Governance Institute (IT Governance Institute & KPMG,
2003) provide a solid overview by enlisting the relevant parts of IT governance. The following table
contains a mapping between the processes prescribed in the framework and the IT governance focus
areas.
The respective color indicates the level of affiliation of the process to the IT governance focus area.
Grey means that there is no substantial coherence; the bright green indicates that the area is partially or
indirectly covered and the dark green signifies direct coverage of the focus area.
A well protected
The security plan
physical
SEC03 implies risk
infrastructure Facilities are
Physical management for
prevents from theft properly managed.
Environment the physical
and
infrastructure.
misconfiguration.
Peter Josi 35
IT Governance for SME
Risk management
CON01 practices are
Disruptive events
Continuity applied by
are reduced.
Planning establishing the
business impact.
Future needs
Proactive risk
CON02 regarding Optimal and cost-
management
Availability & availability and effective service
through monitoring
Capacity capacity are taken provisioning.
and alerting.
into account.
Future direction is
Optimal
clear which leads to
alignment with
SP01 a concentration of
business
Strategy resources to the
objectives and
determined
long-term IT goals
direction
IT Portfolio
Exploit synergies
SP02 management of
and reduce
Projects programs, projects,
redundancies
services and assets
Optimal end-user
CI01
support increases
Incidents
productivity
Peter Josi 36
IT Governance for SME
Knowledge- Transformation of
CI02
Database enhances information into
Knowledge
productivity knowledge.
The table states that all focus areas are covered by the framework, except performance measurement.
Although performance measurement is not directly addressed, the defined metrics within the processes
provide the foundation for setting up concrete measures for assessing the performance. However, a direct
coverage of this focus area is indeed inexistent. This is due to the fact that performance measurement
was not rated to be that important in the interviews so that it should have been integrated in the
framework. A reason for this may be that the ability to measure the performance requires a certain
process maturity (repeatability) and, at most of the interview partners, this maturity level was still far
away.
This framework should enable small and medium-sized enterprises to govern their IT in a simple and
pragmatic manner. By looking at the table, this statement can be confirmed. Rather strategic topics have
been reduced to an adequate minimum and special emphasis has been placed to operational topics. To
summarize, the framework covers all relevant IT processes for small and medium-sized enterprises and
its implementation is a good step towards IT governance.
Peter Josi 37