IT Security Mgmt Process Description

1Introduction 2Serv. Mgmt. 3Principles 4Processes 5Tech Activities 6Organization 7Tech Considerations 8Implementation 9Challenges Appendeces

4.1SC MGMT 4.2SLM 4.3CAPACITY MGMT 4.4AVAILABILITY MGMT 4.5 CONTINUITY MGMT 4.6SECURITY MGMT 4.7SUPPLIER MGMT

Triggers
  • corporate governance guidelines
  • Business Security Policy
  • corporate risk management processes and guidelines
  • business needs
  • services
  • requirementsD
  • Business and IT plans and strategies
  • Designs and strategies
  • Security breaches/warnings/events/alerts
  • Periodic activitiesD
  • Change of risk or impact of a business process, VBF, service or component
  • Requests from other areas
Controls
  • Enforcement of inclusion of security concerns in other ITSM process documentationR
  • Corporate governance and business security policies and guidelines
 
Inputs
  • Business informationD
  • Security plans, risk analysis and responses
  • IT informationD
  • Service informationD:
  • Risk Analysis processes and reportsD
  • Details of all security events and breachesD
  • Change informationD
  • CMSD
  • Details of partner and supplier accessD
Processes

  • Security Policy production, review, revision, communication, implementation and enforcement
  • Security assessment and classification of information assets and documentation
  • Implementation, review, revision and improvement of a set of security controls and risk assessment and responses
  • Monitoring and management of breaches and major security incidents
  • Analysis, reporting and reduction of the volumes and impact of security breaches and incidents
  • Schedule and completion of security reviews, audits and penetration tests.
Outputs
  • An overall Information Security Management Policy, together with a set of specific security policies
  • SMIS
  • Revised security risk assessment processes and reports
  • security controlsD
  • Security audits and audit reports
  • Security test schedules and plansD
  • Security classifications
  • Classified information assets
  • Reviews and reports of security breaches and major incidents
  • Policies, processes and proceduresD
  Mechanisms
  • Audits
  • Security testing
  • Security policy awareness
  • Updatng Technical Service Catalogue for security commitments
KPIs
  • % decrease in security and ISM process breaches and non-conformance findings
  • % increase in SLA conformance to security clauses
  • % increase in awareness of the security policies
  • % decrease in the impact of security breaches and incidents


Visit my web site