Process Reference Model: Aligning Processes and Procedures

Process Reference Model: Aligning Processes and Procedures

Process Reference Model: Aligning Processes and Procedures

Written by

Aron Lange

Published

Dec 29, 2023

Can you explain the difference between a process and a procedure?

I have to admit, I couldn’t.

This is why, I have done some research and created this article.

In the following we are going to discover the differences between processes and procedures and how a Process Reference Model (PRM) can help to align Policies, Standards and Procedures with activities related to information security.

A solid information security documentation is foundational to an organization's security posture. It typically consists of:

  1. Policies: High-level statements of intent and direction set by management.

  2. Standards: Specific mandatory requirements, rules, and configurations.

  3. Procedures: Detailed step-by-step instructions to achieve policy objectives.

  4. Guidelines: Recommended practices that are not mandatory but advised.

While policies, standards, procedures, and guidelines are the traditional components of cybersecurity documentation, the concept of 'processes' is often absent. This is not to say that processes are unimportant; on the contrary, they are vital for understanding the broader context and flow of how various tasks and activities contribute to achieving information security objectives. However, processes are often not considered to be a part of formal documentation.

Let’s explore why that might be the case.

What is a Process?

According to ISO 9000:2015, a process is defined as:

“A set of interrelated or interacting activities that uses or transforms inputs to deliver a result.”

In other words, processes are about creating value by transforming inputs into more useful and higher-order outputs. This is achieved through a series of activities. They are interconnected and often dependent on the preceding steps. The efficiency and effectiveness of a process depend on how well these activities are planned and executed. This is why procedures are needed.



More information and guidance on processes can be found on my YouTube Channel.


What is a Procedure?

According to ISO 30000:2009, a procedure is defined as:

“A specified way to carry out an activity or a process.”

There you have it. Activities are outlined and described by detailed procedures. These documents help to ensure that each step is executed with precision and consistency, contributing to the overall objective of delivering the intended results of the overarching process.

Process Reference Model

All procedures are related to processes and support them to deliver the desired results.

A Process Reference Model (PRM) is a framework that provides a structured representation of processes within an organization.

Process Reference Models (PRM) distinguish between three types of processes:

  1. Management Processes: These processes define the objectives of the management system, including IS governance and management interface processes.

  2. Core Processes: These are the main elements of the ISMS, delivering direct customer value. They include security policy management, information security (IS) risk assessment, IS risk treatment, outsourced services control, and IS improvement processes, among others.

  3. Support Processes: These processes provide and manage necessary resources without delivering direct customer value. Examples include record control, resource management, communication processes, and IS customer relation processes.

Each process is detailed with the following elements:

  • Process category

  • Brief description

  • Objectives/purposes

  • Inputs

  • Results

  • Activities/functions

  • References (to other ISMS standards/clauses).

The activity element allows us to create a direct relationship between processes and procedures. Each activity must be described by one procedure. It is of course possible to outline several activities in one procedure to minimise the number of documents. Just make sure that an activity is not described by more than one procedure at the same time, as this might lead to confusion and contradictions.

ISO 27022 provides a PRM for information security management systems in the context of ISO 27001.

It contains the following processes, categorised into management, core and support processes:

Management Processes

  • Information Security Governance Interface Process

Core Processes

  • Security policy management process

  • Requirements management process

  • Information security risk assessment process

  • Information security risk treatment process

  • Security implementation management process

  • Process to control outsourced services

  • Process to assure necessary awareness and competence

  • Information security incident management process

  • Information security change management process

  • Internal audit process

  • Performance evaluation process

  • Information security improvement process

Support Processes

  • Records control process

  • Resource Management process

  • Communication process

  • Information security customer relationship management process

For each of the listed activities a corresponding procedure can be defined, which will link the process with the procedures.

A broad selection of courses

Take one of our GRC courses and build impactful skills to advance your career.

A broad selection of courses

Take one of our GRC courses and build impactful skills to advance your career.

A broad selection of courses

Take one of our GRC courses and build impactful skills to advance your career.