You are on page 1of 5

Copyright © 2007 ISACA. All rights reserved. www.isaca.org.

A Cosmological Approach to IT Governance:


Val IT and COBIT Lessons Learned at the United Nations
By Jason Bellone, Dino Cataldo Dell’Accio, CISA, CISM, CIA, ISMS LA, and Juan Rodriguez
As Carl Sagan once said, “If you want to make an apple pie Edition and then updated with the control structure and goals
from scratch, you must first create the universe.” This tenet and metrics of COBIT 4.0.
served as the basis for an IT governance restructuring within The governance model includes a mapping of each IT
the United Nations (UN) Secretariat. The project has been organizational unit and its respective projects/activities and
underway for nearly one year, and many outcomes and lessons processes with the organizational goals. Each of the expected
learned have emerged. By taking a “cosmological” approach to accomplishments is decomposed into performance indicators
defining and managing a governance system, the methodology taken from COBIT key goal indicator (KGI) and key
has produced positive results to institutionalizing a Val performance indicator (KPI) baselines. The model is supported
IT/COBIT-based governance framework. The approach, tools by defined sources of data, processes, documents and
and lessons learned are provided as a case study of this responsible owners, to allow for the systematic collection of
experience. data and periodic reporting. Clearly, this effort requires a
systematic approach supported by well-defined policy,
Organizational Context processes and tools. Efforts to establish a governance universe
The UN places high demand on IT as an “enabler” to the are synopsized in this case study.
organization’s mission. IT services contribute to nearly all
operational activities, yet as requirements and demand grow, Val IT: The Galaxy
the budget does not. In the quest to better prioritize which IT The Val IT model is based on three domains of processes:
investments to make and to govern their implementation, the Value Governance, Portfolio Management and Investment
organization referenced the IT Governance Institute (ITGI) Management. The three domains are further detailed by a set
best practices defined in the Val IT and Control Objectives for of 40 management practices, logically linkable to the control
Information and related Technology (COBIT) models. The Val objectives defined in the COBIT framework. These linkages
IT model was adopted to support the decision-making process provide the basis for a complementing analysis, ultimately
for IT investments, ultimately responding to the question of leading to a comprehensive review of the entire IT investment
which initiatives achieve the highest return. The COBIT life cycle.
governance framework is used to govern the subsequent In this context, the support from IT investments to the
execution of the IT investments, addressing key questions of achievement of the organization’s strategic goals is guided by a
whether and how the return is achieved. set of value management processes, enabled by management
Figure 1, taken from the 2008-2009 budget instructions best practices and control objectives, and measured by key
directive, reflects the alignment between the information and outcome and performance metrics. The definition of the metric
communication technology (ICT) strategic framework and the system was derived from an adaptation of some of the goal
COBIT governance model. As shown, the budget framework is indicators included in COBIT 4.0.
logically linked with the corresponding COBIT domains.
The adoption of COBIT was a perfect fit for the UN’s COBIT Cosmology: Mapping the Universe
results-based management and budgeting approach. The The COBIT governance framework, composed of four
project was initially designed with reference to COBIT 3rd domains; 34 high-level control objectives; more than 200
detailed control objectives; and thousands of goals, metrics,
Figure 1—2008-2009 Budget Framework gaps, risks and assets, is a complex system. When the various
Objective of the organization: business processes and best practices, such as information
To ensure that ICT services efficiently and effectively support the security, quality assurance, service delivery, project
operational objectives of the organization management, budget and risk management, are integrated with
Expected accomplishments: the framework, there are an unwieldy number of permutations.
1. Improved alignment of ICT initiatives with the organization’s Each must be managed individually and collectively, both as a
operational objectives star and a universe. A question emerges: how can one manage
2. Improved timeliness and effectiveness of ICT acquisition and such a complex system?
implementation processes The answer was to logically map the universe and create a
3. Increased efficiency and effectiveness in delivering and supporting real-time atlas of the governance system. As figure 2
ICT applications, systems and services illustrates, a rendering of the universe was created based off a
4. Increased responsiveness in closing operational gaps number of models, strategic directions, programmatic

JOURNALONLINE 1
objectives, controls and processes. The atlas represents a The same approach was taken for service management (ITIL),
holistic understanding of the system and the numerous quality assurance (ISO 9000) and numerous others.
interrelationships and interdependencies of governance The constellation represents a structured workflow
activities. The figure is not a graphic but a dynamically representing two different orientations—in this case, the
generated visualization rendered from a governance schema management and audit of an activity. The duality presents a
(database) where dozens of governance, management and number of opportunities for coordination and position for
workflow processes are structured. The perspective offers some continuous audit. The chief information security officer
deterministic insights to forces of influence, dualities, (CISO) oversees the process, and the audit function is enabled
synergies, and macro- and micro-level planning structures. by real-time access to the status of the implementation—where
the gaps are, what the risks are, which controls are applied and,
COBIT Constellations most important, how the process is managed. This facility has
Within the universe model, several subject-specific fostered a stronger harmonization between the activities of
constellations were defined to represent lines of activity and managing and monitoring a program.
process models. Based on a use-case approach, all actors and
perspectives (auditor, senior management, process owner, MyStar: Encouraging Ownership
project manager) are represented. A process model for each and Accountability
high-level control objective is established and integrated with The concept of constellations and modeling of processes is
its companion “practitioner” workflow. necessary to establish workflows and, most important,
Take, for example, DS5 Ensure system security and the encouraging ownership and accountability for implementation
correlating processes that would be employed by referencing of controls. A critical success factor to the project was to
ISO 27000 and the establishment of a well-functioning ensure that all actors could interact, participate and contribute
information security management system (ISMS). By creating to the exploration of the universe and drill down to a
a vortex between the COBIT framework and the ISMS process constellation (activity) of interest. In the case of managing an
model, a constellation is formed based on the intended results. ISMS, the standard calls for a plan-do-check-act (PDCA) life
Figure 3 illustrates the concept. Based on the principle of cycle. This point of view is fully represented with the full
duality, the approaches are integrated and a synergy is formed. range of activities of the life cycle.

Figure 2—Atlas of the Governance System

2 INFORMATION SYSTEMS CONTROL JOURNAL, VOLUME 3, 2004


Figure 3—Constellation Based on Intended Results

As figure 4 demonstrates, each activity and “do” task is 6 Degrees: An IT Governance and
fully represented in the system and coupled to assignment of Management Tool Kit
ownership. The figure is indicative of the tight binding of A tool is not the end to the means, but is vital; therefore, a
perspectives reflecting the points of view between audit and tool was needed to examine governance. This article’s
auditee, senior management and project managers, and illustrations represent a tool kit developed and named after the
business units and service providers. The approach has created concept known as the six-link rule: 6 Degrees. True to its
a more harmonious relationship among organizationally name, 6 Degrees has paid dividends in ensuring the necessary
separated peer groups and enabled a more collaborative forum. linkages and harmonization of governance initiatives.
Borrowing from the visualization technologies of the
Hubble Views: Checking and Reporting scientific and informatics industries, the 6 Degrees system was
As processes become increasingly integrated, the value of developed based on five conceptual layers:
this approach becomes apparent in the facility by which one 1. A logical model (database) integrating all high-level
can analyze and report, particularly in the way of Capability structures and processes of the governance system
Maturity Model (CMM)-oriented dashboarding, assessment of 2. A workflow-based input/output interface to ensure process
risk or budgetary reporting. As figure 5 illustrates, telescopic and data-driven currency and accuracy
views enable dynamic monitoring of the governance system 3. A quantitative analysis engine using OLAP methods
and its interconnected subsystems. 4. A visualization gateway to the model adopted from the fields
In the case of the UN, where results-based budgeting serves of social network analysis and complex systems theory
as the basis for justifying funding, linking projects to CMM 5. A real-time reporting and dashboarding facility
performance objectives is vital. Return on investment is tightly The 6 Degrees system was established on the proverbial
coupled to performance objectives (and gaps) related to a shoestring budget using open source resources, but the
maturity indicator for each line of activity. Most important, the returns have proved invaluable. The portal provides a single
supporting data are dynamic and updated through the natural source window and analytical tool kit for extending the
course of the PDCA life cycle. The question “Where are we organization’s ability toward more complex analysis and
today?” is not answered tomorrow. quantitative measurement—what ifs, simulation, cost-benefit
analysis, budget formulation, resource allocation and
business intelligence.

INFORMATION SYSTEMS CONTROL JOURNAL, VOLUME 3, 2004 3


Figure 4—Varied Perspectives

Figures 2 through 5 are generated on demand from of an understanding of the sum of the parts and the strategy of the
workflow-related inputs. 6 Degrees is providing a powerful means whole. Actors have an increased appreciation for their role and
of making invisible patterns of workflow and collaboration in contribution to the governance system. Thanks to the construction
strategically important groups visible. The benefits to audit and of the universe, the system is no longer abstract; it is planned and
continuous improvement have shown tremendous promise. Gap organized. The system has received positive feedback and
analysis, diagnostic reviews, risk assessments and compliance acknowledgment from all these entities. The governance
reports are generated on demand and reflect the multidimensional framework is gaining increasing acceptance as it is woven into the
alignment with resources and processes. culture of the organization. The approach is increasingly
institutionalized and rooted, and it is equally embraced by the
Lessons Learned practitioner, as it is an audit guideline. The approach,
The system was designed to address two main needs: complemented with the tool kit, has provided new capability to the
1. To govern projects, activities and processes using organization toward continuous improvement practices, compliance
strategically constructed integrations among workflows with industry standards and decision-making support
2. To present strategy and report on its implementation to the The tangibility of the benefits is growing and has become
senior management and oversight bodies increasingly evident. Recently, the UN received ISO 27000
Since the initiation of this project, several noteworthy certification. During the certification audit, the organization
benefits have been realized. In particular, the organization was was asked to show auditors its ISMS. The staff members
able to achieve a clearer and controllable reporting system about clicked a button and said “Here.” There were no additional
the performance of the IT function. Predefined metrics have questions, tedious explanations or confusion.
allowed the organization to identify baselines for comparative While many steps lie ahead for this path of ICT governance,
analysis and consistently monitor the performance of the IT a map is drawn and the universe is charted. If Carl Sagan was
function over time. Because of the previously mentioned right, the apple pie should be forthcoming.
mapping among organizational units, projects, activities and
processes, and organizational goals, the system allows for a Author’s Note:
better representation of how resources (financial and human) are Readers are invited to contact the authors for further details.
allocated and used to achieve the goals. The web-based tool 6 Degrees described in this paper will be
The achievements can be best expressed by the greatest benefit made freely available to interested parties upon request.

4 INFORMATION SYSTEMS CONTROL JOURNAL, VOLUME 3, 2004


Figure 5—Dynamic Monitoring

Jason Bellone enterprisewide risk assessments, developing and implementing


is chief of the ICT quality assurance and risk management ISO-based diagnostic reviews, and auditing strategies, and
section in the information technology services division of the control mechanisms with reference to widely accepted
UN Secretariat in New York (USA). He coordinates an professional standards and best practices. He has held various
enterprisewide campaign to implement COBIT-based IT positions as auditor in the UN system and finance sector.
governance systems and related best practices worldwide. Prior
to taking post with the UN, Jason held several public service Juan Rodriguez
positions with the US government. is an ICT security expert and serves as the UN ICT quality
assurance and risk management section’s resident technical
Dino Cataldo Dell’Accio, CISA, CISM, CIA, guru where he has been dedicated to the development of an
ISMS Lead Auditor open source ICT governance tool known as 6 Degrees. He has
is an information security officer in the UN in New York. In worked in several international organizations, including the
this capacity, he has been involved in several projects UN, UN Children’s Fund (UNICEF), Berlitz International and
pertaining to the implementation of information security General Electric, and he has more than 10 years of experience
systems and controls. He has experience in conducting in the IT industry.

Information Systems Control Journal is published by ISACA. Membership in the association, a voluntary organization serving IT governance professionals, entitles one to receive an annual subscription to
the Information Systems Control Journal.

Opinions expressed in the Information Systems Control Journal represent the views of the authors and advertisers. They may differ from policies and official statements of ISACA and/or the IT
Governance Institute® and their committees, and from opinions endorsed by authors’ employers, or the editors of this Journal. Information Systems Control Journal does not attest to the originality of
authors' content.

© Copyright 2007 by ISACA. All rights reserved.

Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the
association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, Mass. 01970, to photocopy articles
owned by ISACA, for a flat fee of US $2.50 per article plus 25¢ per page. Send payment to the CCC stating the ISSN (1526-7407), date, volume, and first and last page number of each article.
Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the association or the copyright owner is expressly
prohibited.

www.isaca.org

INFORMATION SYSTEMS CONTROL JOURNAL, VOLUME 3, 2004 5

You might also like