COSO Principle 6: The entity specifies objectives with sufficient clarity to enable the identification and assessment of risks relating to objectives.
Points of focus:
Operations Objectives:
- Reflects Management's Choices
- Considers Tolerances for Risk
- Includes Operations and Financial Performance Goals
- Forms a Basis for Committing of Resources
External Financial Reporting Objectives:
- Complies With Applicable Accounting Standards
- Considers Materiality
- Reflects Entity Activities
External Nonfinancial Reporting Objectives:
- Complies With Externally Established Frameworks
- Considers the Required Level of Precision
- Reflects Entity Activities
Internal Reporting Objectives:
- Reflects Management's Choices
- Considers the Required Level of Precision
- Reflects Entity Activities
Compliance Objectives:
- Reflects External Laws and Regulations
- Considers Tolerances for Risk
- Establishes Sub- objectives to Support Objectives
Organization's top management sets security objectives. Security objectives meet the following requirements:
In connection with the documentation of security objectives, the necessary top-level improvements and tasks, needed resources, responsible persons, due dates and methods for evaluating the results in order to achieve the objectives are also defined.
Compliance with required laws, regulations, standards, and contractual obligations can be as challenging as dealing with an ever-changing threat environment and new forms of cyber-attacks.
The organization shall document the information security requirements and the organisation's operating model for meeting them.
It is important to note that a large part of the requirements (e.g. laws, standards) are evolving entities. It is recommended to define a review interval for the documentation to describe the frequency at which changes in the requirements should at least be checked.
The organization must define the frameworks that are used as the basis of the management system. Requirements frameworks should address:
Internal reporting goals:
Requirement fulfillment goals:
Top management shall review the organization's information security management system at planned intervals to ensure that it remains appropriate, relevant and effective.
The management review shall address and comment on at least the following:
Documented information on the execution and results of reviews must be maintained.
When setting the organization's information security objectives, external objectives must be taken into account. This means, for example:
In Cyberday, all frameworks’ requirements are mapped into universal tasks, so you achieve multi-framework compliance effortlessly.