D.I.O.R. – A Model for Information Security Organization

Clearly defined responsibilities and scope of authority for security organizations vary widely across different companies and industries. To help address this challenge, I have developed an organizational framework for the information security function. As a model, this should be considered a starting point for adapting to a particular environment, not a set-in-stone guide as to the division of responsibilities, nor should it be considered all-encompassing in defining every possible function to be performed.

In organizing and staffing your security function, be sure to consider the personalities and interests of the people you are hiring. Not all security professionals are identical, and just as in the medical profession, security professionals tend to gravitate into particular subspecialties based on their personality and interests. Trying to make every security professional a generalist is a recipe for mediocracy and failure, likewise, an information security organization without distinct responsibilities and staff to perform them is no organization at all.


The acronym DIOR, stands for what I consider the key responsibilities of any security organization – Define (the risk & plan), Implement (the plan), Operate (the plan), Respond (to incidents). How these components are organized, as departments within the overall security organization, or spread across multiple departments in a matrixed fashion, is highly dependent on where Information Security sits within the organization and the scope of authority of the Chief Information Security Officer (CISO).


The overarching goal of any security organization should be to defend the brand and operations of the business from cyber threats by implementing a risk-based security program and plan. To define and maintain this program is the focus of the “Define” team, which is usually led by the CISO or the designated head of security. The Office of the CISO is also a term that is used to describe those who are on the Define team.

To accomplish the objective of “Define”, the following functions should be considered:

  1. Understand the mission and objectives of the organization, as well as its operating constraints and regulatory requirements
  2. Identify the critical assets to the organization, including systems and data
  3. Determine the likely threats to the organization and its assets
  4. Develop the policies and controls needed to address these threats
  5. Monitor the effectiveness of, and adherence, to the controls in reducing risk and update risk plans accordingly
  6. Train users on relevant cyber risks, maintain ongoing awareness, and test that awareness to ensure the training is effective
  7. Govern the program by developing and maintaining relationships with key stakeholders, to gain consensus and support on the program and plans, and to report progress


Implementation of security organization is accomplished through the implementation of security controls, processes, and technologies, which are integrated into the business environment. A common failing of information security is to introduce controls without consideration of the impact that they have on business/IT operations, worker productivity, or ongoing support cost.

To accomplish the objective of “Implement”, the following functions should be considered:

  1. Evaluate/recommend control technologies and processes needed to meet policy requirements and integrate them into the business environment
  2. Keep abreast of changes in technologies, processes, and the business that impact organizational security
  3. Review/approve changes in the organization’s technology environment
  4. Develop secure architectures for technology deployment, aligned to the business needs of the organization
  5. Develop standards for the secure configuration of IT/IS products and services and update annually and as needed
  6. Work with IT operations in the implementation and configuration of security-related technologies


Operating security technologies effectively is a requirement all too often given short shrift in many organizations, and as a result, expected gains in risk reduction are rarely achieved. Centralizing security operations, and considering the cost of this in technology/process decisions, ensures that costs/benefits are realistically addressed in the evaluation of alternatives.

To accomplish the objective of “Operate”, the following functions should be considered (this is much larger than it looks due to the number of technologies typically deployed):

  1. Operate and monitor the security suite of tools to prevent, detect and respond to intrusions, attacks, and vulnerabilities
  2. Investigate events, raising confirmed or suspected intrusions to the Respond team as appropriate to the risk
  3. Coordinate with IT operations (internal or outsourced) to track and remediate identified issues and vulnerabilities


A security program that has not prepared for the eventuality of failure is a failed security program. Incidents are inevitable in any security organization, regardless of size or budget. The degree to which organizations are prepared for these events is what determines whether the organization survives or suffers significant costs or even business failure. A common flaw in security organizations is to not staff for response/recovery as a dedicated function, which is to say that preparation is ad hoc at best as it is left to the rest of the organization.

To accomplish the objective of “Respond”, the following functions should be considered

  1. Investigate possible attacks as raised by the Operate team and coordinate response, remediation, and recovery as appropriate
  2. Plan and prepare for likely attack scenarios and train participants in what to expect and how to respond
  3. Monitor operational threat intelligence and alert the Define team as needed to significant new threats
  4. Test the resiliency of the organization and effectiveness of controls on a periodic basis through internal and external testing
  5. Prepare and coordinate outside resources as needed to support response plans and activities

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s