SlideShare a Scribd company logo
1 of 10
SECURING INFORMATION SERVICES
SECURITY BENCHMARK
 Elevated
 Standards defined by customer
 Advanced security controls
 Meet Customer demands
 Cost by Customer/Organization
 Periodic review by Customer/Third Party
 Approvals by Customer/Organization
Example: Customers 3 & 6 are identified as elevated customers
and hence a custom security model will be introduced and
followed for these customers.
 Baseline
 Organization standard practices
 Mandatory security controls
 No customer security demands
 Cost by Organization
 Periodic Review by Organization/Third party
 Approvals by Organization
Example: Customers 1, 2, 5 & 7 are identified as baseline
customers. These customers agree to organization's general
security practices therefore a single security model will be
followed.
DATA PROTECTION MECHANISMS
Objective: To understand and apply security controls for the protection of confidentiality, integrity, and
availability of critical data or business functions.
Layering: Multiple controls in a series
Abstraction: Similar elements are put into group
Data Hiding: Preventing data from being
discovered or accessed
Encryption : Limit access to intended recipients
IDENTITY AND ACCESS MANAGEMENT
Objective: To control access to computer resources, enforcing policies, auditing usage, and trace action
to specific user.
Authentication
 Single Sign on
 RADIUS
 Multi Factor
Authorization
 Access Management
 Endpoint validation
Accounting
 Audit logging
RISK MANAGEMENT
Objective: To develop strategies and implement proper controls that reduces overall risks associated with
critical assets, to determine the severity of impact to the business due to any risk that affects the
confidentiality, integrity or availability of critical assets.
Identify Threats and Vulnerabilities
 Threats against critical assets
Risk Assessment/Analysis
 Qualitative Analysis
o Delphi Technique
 Quantitative Analysis
o Revenue Loss in Dollars
o Cost benefit Analysis
Risk Response
 Reduce or mitigate
 Assign or transfer
 Accept
 Reject or ignore
 Residual risk
Objective: To ensure that any change does not lead to reduced or compromised security, which can
impact confidentiality, integrity or availability of any information or business functions.
PDCA Model
 Change Management
 Improvement/New requirement
 Corrective Action/Fix plan
 Release Management
 Test Plan
 Execute Change
 Incident Management
 Change failure
 New Incident reported
 Problem Management
 Input from incident
 New problem reported
 Configuration Management
 Track Configuration Items
CHANGE MANAGEMENT
BUSINESS CONTINUITY PLAN
Objective: To implement a combination of policies, procedures, and processes such that a potentially
disruptive event has as little impact on the business as possible.
BCP Lifecycle :
Project scope
Risk Assessment
Business impact analysis
Continuity planning
Approval, Execute plan
Test, Monitor
DISASTER RECOVERY PLAN
Objective: To create a documented process or set of procedures to recover and protect a business IT
infrastructure in the event of a disaster.
Preparedness
 HA, Redundancy
 24/7 Monitoring
 Data backup
 Recovery Procedures
Response
 Incident Management
 Emergency Call Tree
 24/7 Support
Recovery
 Execute Recovery Plan
Mitigation
 Revise CAP & PAP
 BCP Continuous Improvement
Thank you
Thank you

More Related Content

What's hot

Mcs2453 aniq mc101053-assignment2
Mcs2453 aniq mc101053-assignment2Mcs2453 aniq mc101053-assignment2
Mcs2453 aniq mc101053-assignment2Aniq Eastrarulkhair
 
GDPR During the Coronavirus Crisis - Prof Hernan Huwyler MBA CPA
GDPR During the Coronavirus Crisis - Prof Hernan Huwyler MBA CPAGDPR During the Coronavirus Crisis - Prof Hernan Huwyler MBA CPA
GDPR During the Coronavirus Crisis - Prof Hernan Huwyler MBA CPAHernan Huwyler, MBA CPA
 
ISO 22301 leadership buy in presentation
ISO 22301 leadership buy in presentationISO 22301 leadership buy in presentation
ISO 22301 leadership buy in presentationQualsys Ltd
 
Best practice approach for PLM, Product Supply and Sourcing
Best practice approach for PLM, Product Supply and SourcingBest practice approach for PLM, Product Supply and Sourcing
Best practice approach for PLM, Product Supply and SourcingQualsys Ltd
 
Risk Assessment Framework
Risk Assessment FrameworkRisk Assessment Framework
Risk Assessment FrameworkJhurt7103
 
GRC - Isaca Training 16.9.2014
GRC - Isaca Training 16.9.2014GRC - Isaca Training 16.9.2014
GRC - Isaca Training 16.9.2014Paul Simidi
 
Ten Slides in Ten Minutes - Company Realities - GRC
Ten Slides in Ten Minutes - Company Realities - GRCTen Slides in Ten Minutes - Company Realities - GRC
Ten Slides in Ten Minutes - Company Realities - GRCBill Graham CP.APMP
 
Extracting Knowledge from your Asset Management System
Extracting Knowledge from your Asset Management SystemExtracting Knowledge from your Asset Management System
Extracting Knowledge from your Asset Management SystemJohn Reeve
 
App Showcase: Internal Audit
App Showcase: Internal AuditApp Showcase: Internal Audit
App Showcase: Internal AuditResolver Inc.
 
e-A11: Workshop B - Building your accessibility action plan
e-A11: Workshop B - Building your accessibility action plane-A11: Workshop B - Building your accessibility action plan
e-A11: Workshop B - Building your accessibility action planHeadstar
 
GP for Regulatory Management Product Sheet
GP for Regulatory Management Product SheetGP for Regulatory Management Product Sheet
GP for Regulatory Management Product SheetMarco Villacorta Olano
 
BRG_CSP_Study-Summary-nofees
BRG_CSP_Study-Summary-nofeesBRG_CSP_Study-Summary-nofees
BRG_CSP_Study-Summary-nofeesFaisal Amin
 
SABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSAcourses
 
Security Architecture Principles
Security Architecture PrinciplesSecurity Architecture Principles
Security Architecture PrinciplesRichard Dempers
 
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...PECB
 

What's hot (20)

Mcs2453 aniq mc101053-assignment2
Mcs2453 aniq mc101053-assignment2Mcs2453 aniq mc101053-assignment2
Mcs2453 aniq mc101053-assignment2
 
GDPR During the Coronavirus Crisis - Prof Hernan Huwyler MBA CPA
GDPR During the Coronavirus Crisis - Prof Hernan Huwyler MBA CPAGDPR During the Coronavirus Crisis - Prof Hernan Huwyler MBA CPA
GDPR During the Coronavirus Crisis - Prof Hernan Huwyler MBA CPA
 
ISO 22301 leadership buy in presentation
ISO 22301 leadership buy in presentationISO 22301 leadership buy in presentation
ISO 22301 leadership buy in presentation
 
Rosemary Francavilla Ins 8-16-15
Rosemary Francavilla Ins 8-16-15Rosemary Francavilla Ins 8-16-15
Rosemary Francavilla Ins 8-16-15
 
Best practice approach for PLM, Product Supply and Sourcing
Best practice approach for PLM, Product Supply and SourcingBest practice approach for PLM, Product Supply and Sourcing
Best practice approach for PLM, Product Supply and Sourcing
 
Risk Assessment Framework
Risk Assessment FrameworkRisk Assessment Framework
Risk Assessment Framework
 
SABSA Implementation(Part II)_ver1-0
SABSA Implementation(Part II)_ver1-0SABSA Implementation(Part II)_ver1-0
SABSA Implementation(Part II)_ver1-0
 
SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0
 
Why Do I Need Managed Services
Why Do I Need Managed ServicesWhy Do I Need Managed Services
Why Do I Need Managed Services
 
GRC - Isaca Training 16.9.2014
GRC - Isaca Training 16.9.2014GRC - Isaca Training 16.9.2014
GRC - Isaca Training 16.9.2014
 
Ten Slides in Ten Minutes - Company Realities - GRC
Ten Slides in Ten Minutes - Company Realities - GRCTen Slides in Ten Minutes - Company Realities - GRC
Ten Slides in Ten Minutes - Company Realities - GRC
 
Extracting Knowledge from your Asset Management System
Extracting Knowledge from your Asset Management SystemExtracting Knowledge from your Asset Management System
Extracting Knowledge from your Asset Management System
 
App Showcase: Internal Audit
App Showcase: Internal AuditApp Showcase: Internal Audit
App Showcase: Internal Audit
 
SABSA Implementation(Part III)_ver1-0
SABSA Implementation(Part III)_ver1-0SABSA Implementation(Part III)_ver1-0
SABSA Implementation(Part III)_ver1-0
 
e-A11: Workshop B - Building your accessibility action plan
e-A11: Workshop B - Building your accessibility action plane-A11: Workshop B - Building your accessibility action plan
e-A11: Workshop B - Building your accessibility action plan
 
GP for Regulatory Management Product Sheet
GP for Regulatory Management Product SheetGP for Regulatory Management Product Sheet
GP for Regulatory Management Product Sheet
 
BRG_CSP_Study-Summary-nofees
BRG_CSP_Study-Summary-nofeesBRG_CSP_Study-Summary-nofees
BRG_CSP_Study-Summary-nofees
 
SABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSA - Business Attributes Profiling
SABSA - Business Attributes Profiling
 
Security Architecture Principles
Security Architecture PrinciplesSecurity Architecture Principles
Security Architecture Principles
 
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
 

Viewers also liked

MarIssa Goles portfolio in EDTECH
MarIssa Goles portfolio in EDTECHMarIssa Goles portfolio in EDTECH
MarIssa Goles portfolio in EDTECHMarissa Goles
 
Build 2016 - P505 - Windows Store Analytics APIs: New Ways to Get Your Hands ...
Build 2016 - P505 - Windows Store Analytics APIs: New Ways to Get Your Hands ...Build 2016 - P505 - Windows Store Analytics APIs: New Ways to Get Your Hands ...
Build 2016 - P505 - Windows Store Analytics APIs: New Ways to Get Your Hands ...Windows Developer
 
Cisco, Vmware, V9000
Cisco, Vmware, V9000Cisco, Vmware, V9000
Cisco, Vmware, V9000Vibi Abraham
 
Janice kapp perry ppt
Janice kapp perry pptJanice kapp perry ppt
Janice kapp perry pptjade clerk
 
Lebanon's SOE Chap 4-Air-Quality
Lebanon's SOE Chap 4-Air-QualityLebanon's SOE Chap 4-Air-Quality
Lebanon's SOE Chap 4-Air-QualityCapricia Chabarekh
 
Bidirectional Visitor Counter with Automatic ON-OFF Switch2
Bidirectional Visitor Counter with Automatic ON-OFF Switch2Bidirectional Visitor Counter with Automatic ON-OFF Switch2
Bidirectional Visitor Counter with Automatic ON-OFF Switch2DIPAN GHOSH
 

Viewers also liked (10)

MarIssa Goles portfolio in EDTECH
MarIssa Goles portfolio in EDTECHMarIssa Goles portfolio in EDTECH
MarIssa Goles portfolio in EDTECH
 
Build 2016 - P505 - Windows Store Analytics APIs: New Ways to Get Your Hands ...
Build 2016 - P505 - Windows Store Analytics APIs: New Ways to Get Your Hands ...Build 2016 - P505 - Windows Store Analytics APIs: New Ways to Get Your Hands ...
Build 2016 - P505 - Windows Store Analytics APIs: New Ways to Get Your Hands ...
 
Cisco, Vmware, V9000
Cisco, Vmware, V9000Cisco, Vmware, V9000
Cisco, Vmware, V9000
 
Janice kapp perry ppt
Janice kapp perry pptJanice kapp perry ppt
Janice kapp perry ppt
 
Lebanon's SOE Chap 4-Air-Quality
Lebanon's SOE Chap 4-Air-QualityLebanon's SOE Chap 4-Air-Quality
Lebanon's SOE Chap 4-Air-Quality
 
Pedagogía digital en el bachillerato
Pedagogía digital en el bachilleratoPedagogía digital en el bachillerato
Pedagogía digital en el bachillerato
 
Le saint suaire f fev 28@@@
Le saint suaire  f fev 28@@@Le saint suaire  f fev 28@@@
Le saint suaire f fev 28@@@
 
Lebanon's RIO+20-Report
Lebanon's RIO+20-ReportLebanon's RIO+20-Report
Lebanon's RIO+20-Report
 
Bidirectional Visitor Counter with Automatic ON-OFF Switch2
Bidirectional Visitor Counter with Automatic ON-OFF Switch2Bidirectional Visitor Counter with Automatic ON-OFF Switch2
Bidirectional Visitor Counter with Automatic ON-OFF Switch2
 
Ro i J Promo
Ro i J PromoRo i J Promo
Ro i J Promo
 

Similar to Securing Information Servicesv1.0

Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
Business case for Information Security program
Business case for Information Security programBusiness case for Information Security program
Business case for Information Security programWilliam Godwin
 
How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2Perficient, Inc.
 
Ensuring SOC 2 Compliance A Comp Checklist.pdf
Ensuring SOC 2 Compliance A Comp Checklist.pdfEnsuring SOC 2 Compliance A Comp Checklist.pdf
Ensuring SOC 2 Compliance A Comp Checklist.pdfsocurely
 
Process Maturity Assessment
Process Maturity AssessmentProcess Maturity Assessment
Process Maturity Assessmentpchronis
 
Using Modelling and Simulation for Policy Decision Support in Identity Manage...
Using Modelling and Simulation for Policy Decision Support in Identity Manage...Using Modelling and Simulation for Policy Decision Support in Identity Manage...
Using Modelling and Simulation for Policy Decision Support in Identity Manage...gueste4e93e3
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
Risk Assessment And Management
Risk Assessment And ManagementRisk Assessment And Management
Risk Assessment And Managementvikasraina
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationEryk Budi Pratama
 
Developing A Risk Based Information Security Program
Developing A Risk Based Information Security ProgramDeveloping A Risk Based Information Security Program
Developing A Risk Based Information Security ProgramTammy Clark
 
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies Veeva Systems
 
Lunch and Learn: June 29, 2010
Lunch and Learn: June 29, 2010Lunch and Learn: June 29, 2010
Lunch and Learn: June 29, 2010prevalentnetworks
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTuan Phan
 
Security Consulting Methodology
Security Consulting MethodologySecurity Consulting Methodology
Security Consulting Methodologyciso_insights
 

Similar to Securing Information Servicesv1.0 (20)

Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Business case for Information Security program
Business case for Information Security programBusiness case for Information Security program
Business case for Information Security program
 
Testing
TestingTesting
Testing
 
How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2How to Drive Value from Operational Risk Data - Part 2
How to Drive Value from Operational Risk Data - Part 2
 
Ensuring SOC 2 Compliance A Comp Checklist.pdf
Ensuring SOC 2 Compliance A Comp Checklist.pdfEnsuring SOC 2 Compliance A Comp Checklist.pdf
Ensuring SOC 2 Compliance A Comp Checklist.pdf
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
Process Maturity Assessment
Process Maturity AssessmentProcess Maturity Assessment
Process Maturity Assessment
 
Using Modelling and Simulation for Policy Decision Support in Identity Manage...
Using Modelling and Simulation for Policy Decision Support in Identity Manage...Using Modelling and Simulation for Policy Decision Support in Identity Manage...
Using Modelling and Simulation for Policy Decision Support in Identity Manage...
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Auditing
AuditingAuditing
Auditing
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
Risk Assessment And Management
Risk Assessment And ManagementRisk Assessment And Management
Risk Assessment And Management
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
Developing A Risk Based Information Security Program
Developing A Risk Based Information Security ProgramDeveloping A Risk Based Information Security Program
Developing A Risk Based Information Security Program
 
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies
 
Risk Management Training
Risk Management TrainingRisk Management Training
Risk Management Training
 
Lunch and Learn: June 29, 2010
Lunch and Learn: June 29, 2010Lunch and Learn: June 29, 2010
Lunch and Learn: June 29, 2010
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public Sector
 
Security Consulting Methodology
Security Consulting MethodologySecurity Consulting Methodology
Security Consulting Methodology
 
Mahalakshmi_Profile
Mahalakshmi_ProfileMahalakshmi_Profile
Mahalakshmi_Profile
 

Securing Information Servicesv1.0

  • 2. SECURITY BENCHMARK  Elevated  Standards defined by customer  Advanced security controls  Meet Customer demands  Cost by Customer/Organization  Periodic review by Customer/Third Party  Approvals by Customer/Organization Example: Customers 3 & 6 are identified as elevated customers and hence a custom security model will be introduced and followed for these customers.  Baseline  Organization standard practices  Mandatory security controls  No customer security demands  Cost by Organization  Periodic Review by Organization/Third party  Approvals by Organization Example: Customers 1, 2, 5 & 7 are identified as baseline customers. These customers agree to organization's general security practices therefore a single security model will be followed.
  • 3. DATA PROTECTION MECHANISMS Objective: To understand and apply security controls for the protection of confidentiality, integrity, and availability of critical data or business functions. Layering: Multiple controls in a series Abstraction: Similar elements are put into group Data Hiding: Preventing data from being discovered or accessed Encryption : Limit access to intended recipients
  • 4. IDENTITY AND ACCESS MANAGEMENT Objective: To control access to computer resources, enforcing policies, auditing usage, and trace action to specific user. Authentication  Single Sign on  RADIUS  Multi Factor Authorization  Access Management  Endpoint validation Accounting  Audit logging
  • 5. RISK MANAGEMENT Objective: To develop strategies and implement proper controls that reduces overall risks associated with critical assets, to determine the severity of impact to the business due to any risk that affects the confidentiality, integrity or availability of critical assets. Identify Threats and Vulnerabilities  Threats against critical assets Risk Assessment/Analysis  Qualitative Analysis o Delphi Technique  Quantitative Analysis o Revenue Loss in Dollars o Cost benefit Analysis Risk Response  Reduce or mitigate  Assign or transfer  Accept  Reject or ignore  Residual risk
  • 6. Objective: To ensure that any change does not lead to reduced or compromised security, which can impact confidentiality, integrity or availability of any information or business functions. PDCA Model  Change Management  Improvement/New requirement  Corrective Action/Fix plan  Release Management  Test Plan  Execute Change  Incident Management  Change failure  New Incident reported  Problem Management  Input from incident  New problem reported  Configuration Management  Track Configuration Items CHANGE MANAGEMENT
  • 7. BUSINESS CONTINUITY PLAN Objective: To implement a combination of policies, procedures, and processes such that a potentially disruptive event has as little impact on the business as possible. BCP Lifecycle : Project scope Risk Assessment Business impact analysis Continuity planning Approval, Execute plan Test, Monitor
  • 8. DISASTER RECOVERY PLAN Objective: To create a documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster. Preparedness  HA, Redundancy  24/7 Monitoring  Data backup  Recovery Procedures Response  Incident Management  Emergency Call Tree  24/7 Support Recovery  Execute Recovery Plan Mitigation  Revise CAP & PAP  BCP Continuous Improvement