Cybersecurity in the Three Lines Model (2024)

Cybersecurity in the Three Lines Model (1)

  • Report this article

Jerry Perullo Cybersecurity in the Three Lines Model (2)

Jerry Perullo

Cybersecurity Advisor, Founder, and Professor

Published Dec 27, 2021

+ Follow

Since 2010, the Three Lines of Defense model has been widely adopted as an authoritative framework for operational and financial enterprise risk management across the globe. The model was not intended to dictate new positions and roles within an organization per se, but to evaluate existing structures to ensure sufficient coverage and independence to provide effective risk management. Even if you are not evaluated against the model today, it is a useful framework to gauge the maturity of your organization and prepare yourself for more advanced scrutiny as you grow.

While the original model and a 2020 "Three Lines Model" update were informed by decades of operational and financial audit, cybersecurity matured a bit late to inherit an obvious place within the paradigm. Likewise, the structure of cybersecurity in the enterprise and how security operations, risk management, and audit are positioned and overseen vary widely and lack consistency. The result is that Chief Information Security Officers (CISOs) differ significantly in their remits, reporting lines, and areas of expertise across firms. This presents challenges for external assessors ranging from auditors and regulatory examiners to Board Risk Committees when trying to apply a consistent evaluation approach across firms. Following is a discussion of where contemporary cybersecurity functions map to the Three Lines Model, where that mapping may identify benefits from independence or collaboration, and how enterprise risk management may prepare and adapt to different organization structures.

Applying the Three Lines Model

The three lines model specifies first and second line functions falling under Management, with a third-line provided by Internal Audit (with an emphasis on independence via accountability to the Governing Body). While the third line (Internal Audit) can and usually will conduct audits specific to Information Security, independence requirements draw a clear distinction that prevents Information Security and the CISO remit from being categorized under the third line in any organization. There is active debate, however, between whether the CISO organization is a first or second line function.

The first line is primarily concerned with the delivery of business products and services, but includes support functions defined to cover "front of house" and "back office" functions. Second line roles, on the other hand, assist with the management of risk. While all information security can be said to concern the management of risk in some capacity, there are some roles that are not merely assisting but providing a direct operational functionality. Examples include monitoring security alerts, conducting forensic analysis, or deploying intrusion prevention systems. While many organizations will house some of these first-line functions under Information Technology outside the CISO remit, most will have at least some of these functions within the CISO organization. Those functions constitute first-line functions of an Information Security group including Incident Response, Security Operations Center (SOC) monitoring, Automation Engineering, Security Architecture consulting, design, and deployment, and the Data Science activities required to operate an effective Security Incident and Event Management system (SIEM).

Second-line roles focus on risk management objectives ranging from legal and regulatory compliance to broader risk management and may include monitoring, testing, analyzing, and reporting on risk management matters. This definition matches a Governance, Risk, and Compliance (GRC) function within Information Security. Looking deeper, Red Teams, Application Security, and Third-Party Risk Management perform proactive monitoring, testing, analyzing, and reporting as well and thus are part of the second-line function of an Information Security group. These teams are likely to work closely with second-line groups outside Information Security such as ERM.

In the diagram below, the IIA's Three Lines Model is depicted with Information Security functions overlaid.

Cybersecurity in the Three Lines Model (3)

Threat Intelligence

A Cyber Threat Intelligence (CTI) group uniquely spans the lines of defense depending on their specific day to day actions. While supporting the analysis of threat objectives for prioritizing the program and contextualizing the risk register, their function falls under the second-line. While delivering tactical intelligence indicators that are matched against detective controls in realtime on the other hand, they are performing a first-line function. Practically speaking, a CTI team may report through either line of defense in day to day management or - for the purists - report directly to an executive CISO to avoid any semblance of conflict.

Enter the CISO

Many organizations have established a Chief Information Security Officer with ostensible primary authority for all cybersecurity matters. The history of that position can often shed light on where the functions under the CISO fit in the three line model.

The First Line CISO

In many organizations, the CISO position was created in response to a tactical breach. In those cases, the CISO will often report to a CIO and be primarily occupied with first-line matters such as operating security monitoring tools and processes, incident response, and the architecture and deployment of preventative and detective controls. In the spirit of the Three Lines Model these should be independent from not only the assessment of operating efficacy, but also from strategic risk assessment that drives prioritization and the initial genesis for control establishment. Organizations with a First Line CISO will often have second-line responsibilities falling within an Enterprise Risk Management (ERM) group often led by a Chief Risk Officer. Some of the largest banks following the First Line CISO model have a Chief Technology Risk Officer owning second-line responsibilities around cybersecurity.

The Second Line CISO

At other organizations, the CISO position will be created in reaction to new governance and oversight structures. Sometimes these structures will be established organically to respond to customer demands, third-party risk management findings, or investor pressure for stronger corporate governance standards. Other times, these structures will be imposed by new regulators brought in by entrance into a new business or market, or by an equity listing on a public exchange. The CISO hired into this model will often have a risk management background, report to a Chief Risk Officer (CRO) or General Counsel (GC), and be primarily tasked with identifying and prioritizing the cybersecurity risks facing the organization. In satisfaction of the Three Lines Model it is likely that the CISO in this instance does not have direct or indirect oversight over incident response or technical control deployment and operation. Organizations with a Second Line CISO may have first line operational duties handled by IT or engineering.

The Executive CISO

At yet another type of organization - often firms with the greatest cybersecurity focus and largest teams - the CISO will be a peer of the CIO and CRO and own siloed teams to perform first and second line functions with independence from each other. In these cases the organization may use the term "Information Security" to more broadly encompass the entire CISO remit, with "Cybersecurity" reserved for the first line and "Security Assurance" applied to the second. In these cases independent senior-level leadership will run each group under the CISO. The first line Cybersecurity head will work closely with the CIO and IT to implement and operate controls, while the second line Security Assurance head may work closely with the CRO to challenge and test controls, identify risks, and consolidate reporting through governance.

Conclusion

A governance body or third-party reviewer should ensure the functions outlined across the first and second line Information Security definitions are tasked and that their management and operation enjoy independence from each other. Where the line will be drawn, however, can vary. It is important to begin such an evaluation by identifying what type of CISO organization and reporting is in place and identifying where those functions may gain independence by being housed outside the CISO in an IT or ERM program.

References

Help improve contributions

Mark contributions as unhelpful if you find them irrelevant or not valuable to the article. This feedback is private to you and won’t be shared publicly.

Contribution hidden for you

This feedback is never shared publicly, we’ll use it to show better contributions to everyone.

Like
Comment

730

59 Comments

Christopher Burke

Manager @ Truist | Risk Management, Compliance, Cybersecurity

7mo

  • Report this comment

What are your thoughts / experience with organizations that have GRC as a 1st Line function. Line 1.5 evaluating the Cyber organization itself, and traditional Lines 2 and 3.

Like Reply

1Reaction

Mauro Rodrigues da Cunha, NACD.DC

Independent Director | Corporate Governance | Audit | Risk | People | ESG | Latino

1y

  • Report this comment

Jerry… thank you for sharing your article when we met at #CIIFall2022. It addresses with precision my worries in terms of org design for the CISO function. Congratulations. I will share with my peers.

Like Reply

1Reaction 2Reactions

Navrisk Consulting

2y

  • Report this comment

Well covered Jerry! This model has been adopted by not only financial institutions but other large multi national organizations using high end technology including AI. Ideally while working in an organization, based on these LODs, there should not be any hard lines as mere presence of structures which tend to define your status is an anathema amongst the new gen. A team approach is always successful.I would say the new IT/cyber security organizations continues to evolve based on learnings, experiences, emerging technologies & threats as well as organizational culture. I have personally observed many rapid evolution in structures in the last fifteen years.Thanks for sharing.

Like Reply

1Reaction

Tim Bateson

Chartered Engineer and cybersecurity leader

2y

  • Report this comment

Dee Pang - Happy New Year! One for us to discuss at some point (perhaps mark up current team workload against this model, then overlay start/stop/continue?).

Like Reply

1Reaction 2Reactions

Sergej Epp

Cybersecurity | CISO at Palo Alto Networks | ex-Deutsche Bank

2y

  • Report this comment

Jerry looking at Europe, things are again a bit different. For instance, regulators would often not allow the CISO to report to the CIO (as described in „First Line CISO“ Option). However, what I like about your 3LOD organizational proposal, is the equilibrium of technical capabilities between both the first and second line. Imagine a second line with only mission to create endless policies and procedures which nobody takes into account. Clearly a model from the past, which does not fit any modern digital bank. Anyway, with 3LOD the regulators helped historically to increase the security mindset across all important security functions…the question is what’s next in the evolution?Don’t we need in FSI in general more 🥕 carrots and less sticks…?

Like Reply

4Reactions 5Reactions

See more comments

To view or add a comment, sign in

More articles by this author

No more previous content

  • An open letter to a fresh cybersecurity hire Sep 2, 2022
  • Vulnerability management is dead. But GRC is hiring... Aug 22, 2022
  • How much AppSec is too much? Aug 19, 2022
  • The value of the True Positive. Jun 22, 2022
  • Making Sense of Geographic Network and Travel Restrictions Feb 25, 2022
  • IOCs aren't for blocking - they are for control validation Feb 5, 2022
  • Patching is Overrated Jan 31, 2022
  • Cybersecurity for Investor Relations and Corporate Governance Jan 6, 2022
  • It's not the 2FA.. it's the 1TP!!! Oct 1, 2020
  • Quick trick to assess your vulnerability to SIM swapping. Oct 25, 2019

No more next content

See all

Sign in

Stay updated on your professional world

Sign in

By clicking Continue, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

New to LinkedIn? Join now

Insights from the community

  • Network Engineering How can you align your vulnerability assessment with your organization's risk management strategy?
  • IT Operations Management How can you ensure IT security and governance teams share a common understanding of IT risks?
  • Systems Management How can you use system security and risk management to gain a competitive edge?
  • Information Security How can you customize a risk management tool to meet your organization's specific needs?
  • Information Security How can you create a scalable risk monitoring and reporting program?
  • Information Security What are the limitations of vulnerability scanners for risk management?
  • Information Security How can you scale and adapt IAM risk management for different business units?
  • Business Architecture How can you improve your organization's information security and risk management program?
  • Information Security How can you make IAM risk management agile and responsive to threats?
  • Risk Management How can you align operational risk management with emerging cyber threats and climate change risks?

Others also viewed

  • Third Party Thursday - January 19, 2023 Venminder 1y
  • Third Party Thursday - April 13, 2023 Venminder 11mo
  • Third Party Thursday - March 9, 2023 Venminder 1y
  • Integrating Information and Communication Technology Risk Programs with Enterprise Risk Management CMMC Solutions 1y
  • Reciprocity ROAR Platform and Product Suite Ashwin Harish.P 1y
  • Third Party Thursday - February 2, 2023 Venminder 1y
  • Disclosure of a Registrant’s Risk Management, Strategy, and Governance Regarding Cybersecurity Risks Bob Chaput-NACD.DC, Cyber-Risk Oversight, CISSP, CRISC 1y
  • Third Party Thursday - February 8, 2024 Venminder 1mo
  • Third Party Thursday - January 12, 2023 Venminder 1y
  • Third Party Thursday - November 9, 2023 Venminder 4mo

Explore topics

  • Sales
  • Marketing
  • Business Administration
  • HR Management
  • Content Management
  • Engineering
  • Soft Skills
  • See All
Cybersecurity in the Three Lines Model (2024)

FAQs

What is the three line model of cybersecurity? ›

As originally conceived: First line of defense: Owns and manages risks/risk owners/managers. Second line of defense: Oversees risks/risk control and compliance. Third line of defense: Provides independent assurance/risk assurance.

What is the 3 line of defense model? ›

The three lines model promotes structured communication and collaboration within the different lines of defense for the audit committee. It encourages sharing information, insights and best practices for a more effective risk management strategy for the overall organization.

Is 3 Lines of Defence outdated? ›

Critics say the approach is oversimplified, outdated, no longer a good representation of how companies should assign risk management responsibilities and ignores the role culture can play. Risk, they argue, is not just a matter for defence and the approach does not recognize the risk reward balance.

What are the roles and responsibilities of the three lines model? ›

  • First line roles: Provision of. products/services. to clients; managing risk.
  • Second line roles: Expertise, support, monitoring and. challenge on. risk-related matters.
  • Third line roles: Independent and. objective assurance. and advice on all. matters related to.

What are the three 3 principles of cyber security? ›

The basic tenets of information security are confidentiality, integrity and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad.

What are the 3 main criteria for cybersecurity? ›

The importance of the security model speaks for itself: Confidentiality, integrity and availability are considered the three most important concepts in infosec. Considering these three principles together within the triad framework guides the development of security policies for organizations.

What are the 3 lines of defense and explain their functions? ›

The human body has three primary lines of defense to fight against foreign invaders, including viruses, bacteria, and fungi. The immune system's three lines of defense include physical and chemical barriers, non-specific innate responses, and specific adaptive responses.

What are the three lines of defense simplified? ›

Individuals in the first line own and manage risk directly. The second line oversees the first line, setting policies, defining risk tolerances, and ensuring they are met. The third line, consisting of internal audit, provides independent assurance of the first two lines.

What is the 3rd line of defense? ›

The third line of defense is immune cells that target specific antigens. The immune cells that play a role in the third line of defense are B-cells and T-cells, both are white blood cells. The B-cells produce antibodies. The T-cells help identify pathogenic cells and destroy targeted cells.

What are the criticism of the three lines model? ›

“Our focus is around coordination and collaboration, and on alignment and integration of the approach used across the model.” Some of the criticism of the Three Lines model is that the lines are too distinct and don't capture the coordination and shared responsibility for risk and control in an organization.

What are the advantages of the three lines of defense? ›

Benefits of the Three Lines of Defense Model

The framework was designed to bring clarity to the issue of risk management, making it 'simple, easy to communicate, and easy to understand. ' It aims to ensure no gaps, overlaps or ambiguities in organizations' risk management and control activities.

Who created the three lines of defence model? ›

Background to 3LOD

In January 2013, the Three Lines of Defence model was published by the Institute of Internal Auditors.

What are the principles of the Three Lines Model? ›

The principles of the Three Lines model include: - Clearly defined roles and responsibilities for risk management across the three lines. - Effective coordination and communication between the lines to avoid duplication of efforts and ensure accountability.

What are the three lines of defense in cyber security? ›

As the chart above shows, the three lines of defense are clearly allocable to different functions: IT and Cybersecurity Operations (1st LoD), Risk & Compliance including cyber risks (2nd LoD) and internal audit (3rd LoD).

What are the two objectives of first line of defense in three line defense model? ›

First Line of Defense – Management

This consists of identifying and assessing controls and mitigating risks. Additionally, business and process owners guide the development and implementation of internal policies and procedures and ensure activities are consistent with University goals and objectives.

What are the 3 levels of cyber security? ›

This text explores three distinct but interconnected domains of security: Network Security, Cloud Security, and Physical Security. Each of these facets plays a vital role in the broader landscape of cybersecurity, addressing diverse challenges and threats that have evolved alongside technological advancements.

What is the three concept of cyber security? ›

The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability. Each component represents a fundamental objective of information security.

What are the 3 major types of cyber security? ›

The 3 major types of cyber security are network security, cloud security, and physical security. Your operating systems and network architecture make up your network security. It can include network protocols, firewalls, wireless access points, hosts, and servers.

What are the 3 standard pillars of cyber security? ›

These three pillars of cyber security—people, processes, and technology—should all work together to build a sturdy defense network. It's these guiding principles that will help you as part of a cyber security team or larger IT department.

Top Articles
Latest Posts
Article information

Author: Nicola Considine CPA

Last Updated:

Views: 6642

Rating: 4.9 / 5 (49 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Nicola Considine CPA

Birthday: 1993-02-26

Address: 3809 Clinton Inlet, East Aleisha, UT 46318-2392

Phone: +2681424145499

Job: Government Technician

Hobby: Calligraphy, Lego building, Worldbuilding, Shooting, Bird watching, Shopping, Cooking

Introduction: My name is Nicola Considine CPA, I am a determined, witty, powerful, brainy, open, smiling, proud person who loves writing and wants to share my knowledge and understanding with you.