{"id":7636,"date":"2015-10-19T18:38:11","date_gmt":"2015-10-19T18:38:11","guid":{"rendered":"https:\/\/multiacademstg.wpengine.com\/27001academy\/?p=7636"},"modified":"2025-07-10T18:26:31","modified_gmt":"2025-07-10T18:26:31","slug":"iso-27001-project-management-implementing-complex-security-controls-using-work-breakdown-structure-wbs","status":"publish","type":"post","link":"https:\/\/advisera.com\/27001academy\/blog\/2015\/10\/19\/iso-27001-project-management-implementing-complex-security-controls-using-work-breakdown-structure-wbs\/","title":{"rendered":"ISO 27001 project management: Implementing complex security controls using Work Breakdown Structure (WBS)"},"content":{"rendered":"<p>What do diverse situations like the Battle of Trafalgar (1805), the Cooley\u2013Tukey FFT algorithm (1965), and the multi-sided market competition have in common? They are all examples of big or complex problems divided into smaller and more manageable pieces to reach a winning solution. This is a strategy called \u201cDivide and Conquer.\u201d<\/p>\n<p>Like war, signal processing, and marketing competition, information security also deals with a complex situation: protecting information in all its forms and in all locations where it is stored or passes through. In this article, I will present you with a concept based on \u201cdivide and conquer\u201d that can be very useful, especially for bigger companies, while implementing <a href=\"\/27001academy\/what-is-iso-27001\/\" target=\"_blank\" rel=\"noopener noreferrer\">ISO 27001<\/a>\u00a0security controls: the Work Breakdown Structure (WBS).<\/p>\n<h2 style=\"padding-top: 10px; padding-bottom: 10px;\">What is a Work Breakdown Structure?<\/h2>\n<p>Originating from project management practices, the Work Breakdown Structure (WBS) is defined by the Project Management Body of Knowledge (PMBoK) as \u201ca deliverable-oriented hierarchical decomposition of the work to be executed by the team.\u201d<\/p>\n<p>A deliverable is any tangible or intangible object produced by a project that is intended to be delivered to a customer. Examples of deliverables are a product, a service, or data. Deliverables may be decomposed into multiple smaller deliverables, also called components (e.g., parts of a product, functionalities of a service, or chapters in a report).<\/p>\n<p>Normally, a WBS is presented graphically in the form of a tree of elements, with the main deliverable at the top, the deliverable components in the middle part, and lists of activities to produce the deliverables at the bottom. Another way to present a WBS is as an indented list. See examples of these presentations at the end of the article<\/p>\n<p>In terms of information, deliverables and components are specified in terms of requirements to be fulfilled, while activities are specified in terms of resources needed, like time, equipment, and cost.<\/p>\n<p>In the ISO 27001 security <a href=\"https:\/\/advisera.com\/27001academy\/iso-27001-documentation-toolkit\/?rel=risk-management&amp;doc=statement-of-applicability\" target=\"_blank\" rel=\"noopener noreferrer\">controls<\/a>\u00a0context, we can have the following examples of deliverables:<\/p>\n<ul>\n<li>Product: data center vault room<\/li>\n<li>Service: network traffic monitoring service<\/li>\n<li>Data: assets inventory database<\/li>\n<li>Activity: server configuration<\/li>\n<\/ul>\n<p><div id=\"middle-banner\" class=\"banner-shortcode\"><\/div><script>loadMiddleBanner();<\/script><br \/>\n<div id=\"side-banner-trigger\" class=\"banner-shortcode\"><\/div><\/p>\n<h2 style=\"padding-top: 10px; padding-bottom: 10px;\">Design principles<\/h2>\n<p>While using a WBS to plan a security control, some rules should be followed to avoid excess or lack of detail, since both can negatively affect the implementation effort:<\/p>\n<ul>\n<li><strong>Focus on outcomes, not actions.<\/strong> To make your WBS more understandable and useful, define as many elements as possible as outcomes to be achieved. Besides reducing the number of actions to be tracked, more outcome elements provide better capacity to identify results that may compromise the security control strength, or performance.<\/li>\n<li><strong>Group activities in a manageable way.<\/strong> Avoid defining for a single deliverable an activity, or group of activities, that would require the allocation of many resources. A good \u201crule of thumb\u201d is to limit the effort required by a single deliverable to less than 80 hours.<\/li>\n<li><strong>Pay attention to detailing level.<\/strong> Though you can make a WBS with any level of detail, try to keep yours between three and seven levels, with the more detailed dedicated to deliverables with high cost or high <a href=\"https:\/\/advisera.com\/27001academy\/iso-27001-documentation-toolkit\/?rel=risk-management&amp;doc=risk-treatment-plan\" target=\"_blank\" rel=\"noopener noreferrer\">risk<\/a>.<\/li>\n<\/ul>\n<h2 style=\"padding-top: 10px; padding-bottom: 10px;\">Benefits and problems of using a WBS<\/h2>\n<p>Some benefits associated with developing a WBS are:<\/p>\n<ul>\n<li><strong>Better knowledge of the required steps.<\/strong> The WBS development is a group effort, where each person involved has needs to be fulfilled in order to achieve the expected results. This situation forces everyone to work to clarify ambiguities, bring out assumptions, and raise critical issues that can impact the control performance.<\/li>\n<li><strong>Improves accountability.<\/strong> The detail level provided by a WBS makes it easier to establish people accountability, since no one can hide under a \u201cbroad specification.\u201d<\/li>\n<li><strong>Improves commitment.<\/strong> As a group work, the WBS development helps create a sense of ownership and involvement with the control implementation.<\/li>\n<\/ul>\n<p>Some problems you must be aware of:<\/p>\n<ul>\n<li><strong>Effort requirement.<\/strong> Depending on the size or complexity of the control to be implemented, the WBS development can take quite a lot of time. And, the more people involved, the more effort involved to balance the many needs and <a href=\"https:\/\/advisera.com\/27001academy\/iso-27001-documentation-toolkit\/?rel=management-system&amp;doc=list-of-legal-regulatory-contractual-and-other-requirements\" target=\"_blank\" rel=\"noopener noreferrer\">requirements<\/a>.<\/li>\n<li><strong>Increase in complexity.<\/strong> The initial developed WBS will rarely remain unchanged. As control development and implementation goes on, some adjustments may be necessary, and the impact of such changes must be evaluated.<\/li>\n<\/ul>\n<h2 style=\"padding-top: 10px; padding-bottom: 10px;\">WBS applied to security controls<\/h2>\n<p>Since nothing is better than a good practical example, let\u2019s see a hypothetical WBS for implementing security controls in an information system:<\/p>\n<ol>\n<li>Information System\n<ol>\n<li style=\"padding-top: 5px;\">Hardware:\n<ol>\n<li style=\"padding-top: 5px;\">Server<\/li>\n<li>Desktop<\/li>\n<li>Mobile<\/li>\n<\/ol>\n<\/li>\n<li>Software:\n<ol>\n<li style=\"padding-top: 5px;\">Operational system<\/li>\n<li>Application<\/li>\n<\/ol>\n<\/li>\n<li>Network:\n<ol>\n<li style=\"padding-top: 5px;\">Cabling (control A.11.2.3 \u2013 Cabling security)<\/li>\n<li>Wireless communication<\/li>\n<li>Remote access<\/li>\n<li>Routers\n<ol>\n<li style=\"padding-top: 5px;\">Network segregation (control A.13.1.3 \u2013 Segregation in networks)\n<ol>\n<li style=\"padding-top: 5px;\">Define network perimeters<\/li>\n<li>Define network traffic rules<\/li>\n<\/ol>\n<\/li>\n<li>Data:\n<ol>\n<li style=\"padding-top: 5px;\">System data<\/li>\n<li>User data<\/li>\n<li>Organization data<\/li>\n<li>Information classification (control A.8.2.1 \u2013 Classification of information)\n<ol>\n<li style=\"padding-top: 5px;\">Define <a href=\"https:\/\/advisera.com\/27001academy\/iso-27001-documentation-toolkit\/?rel=information-security-controls&amp;doc=information-classification-policy\" target=\"_blank\" rel=\"noopener noreferrer\">Information Classification Policy<\/a><\/li>\n<\/ol>\n<\/li>\n<li><a href=\"https:\/\/advisera.com\/27001academy\/iso-27001-documentation-toolkit\/?rel=information-security-controls&amp;doc=inventory-of-assets\" target=\"_blank\" rel=\"noopener noreferrer\">Inventory of Assets<\/a>\u00a0(control A.8.1.1 \u2013 <a href=\"https:\/\/advisera.com\/27001academy\/iso-27001-documentation-toolkit\/?rel=information-security-controls&amp;doc=inventory-of-assets\" target=\"_blank\" rel=\"noopener\">Inventory of assets<\/a>)\n<ol>\n<li style=\"padding-top: 5px;\">Define assets categories<\/li>\n<li>Assets owners (control A.8.1.2 \u2013 Ownership of assets)\n<ol>\n<li style=\"padding-top: 5px;\">Define assets owners<\/li>\n<li>Define owners responsibilities<\/li>\n<\/ol>\n<\/li>\n<li>Asset classification (control A.8.2.1 \u2013 Classification of information)\n<ol>\n<li style=\"padding-top: 5px;\">Define systems classification according to the highest classified information processed by the system<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>Here it is in graphic form (actions are identified by the red font):<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-7637 size-full\" src=\"https:\/\/advisera.com\/wp-content\/uploads\/sites\/5\/2015\/10\/WBS.png\" alt=\"Work Breakdown Structure\" width=\"624\" height=\"288\" srcset=\"\/wp-content\/uploads\/sites\/5\/2015\/10\/WBS.png 624w, \/wp-content\/uploads\/sites\/5\/2015\/10\/WBS-300x138.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/p>\n<h2 style=\"padding-top: 10px; padding-bottom: 10px;\">Build reliable strongholds one brick at a time<\/h2>\n<p>Implementing security may sound like a huge challenge. And it really is, but you don\u2019t need to embrace it all at once. By doing it one piece at a time, you can optimize the effort to ensure each small piece is designed as strong as possible and implemented with all due care, minimizing the chance that all your efforts may be compromised by a situation you could have avoided.<\/p>\n<p><em>Use this <\/em><a href=\"\/conformio\/\" target=\"_blank\" rel=\"noopener noreferrer\">Conformio compliance software<\/a> <em>to guide you through your ISO 27001 project.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What do diverse situations like the Battle of Trafalgar (1805), the Cooley\u2013Tukey FFT algorithm (1965), and the multi-sided market competition have in common? They are all examples of big or complex problems divided into smaller and more manageable pieces to reach a winning solution. This is a strategy called \u201cDivide and Conquer.\u201d Like war, signal &#8230;<\/p>\n","protected":false},"author":41,"featured_media":7639,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[381,811,877,878,879],"class_list":["post-7636","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-iso-27001","tag-project-management","tag-wbs","tag-work-breakdown-structure","tag-security-controls"],"acf":[],"_links":{"self":[{"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/7636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/comments?post=7636"}],"version-history":[{"count":2,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/7636\/revisions"}],"predecessor-version":[{"id":104393,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/7636\/revisions\/104393"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/media\/7639"}],"wp:attachment":[{"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/media?parent=7636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/categories?post=7636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/tags?post=7636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}