SlideShare a Scribd company logo
PRESENTER    Engr. KAPIL DEV
COURSE OUTLINE Polices Security Policy Security Policy Document Policy Documentation
POLICIES High level documents describes Org. values & Strategy of Stakeholders/Senior Mgmt  Represents General Goals, Directions, Objectives & Vision. Lower Level Policies for divisions, with a top to  down approach from high level documents.Management must reassess policies regulatory for updating for new mandates, technologies, regulations ,  strucures. Is auditors will focus on information Security policy.
Security Policy 		 Policy= First step to developing security infrastructure  Set direction for implementation of controls tools procedures Approved by senior mgmt. Documented & communicated to all employees & associates
Security Policy Document Definition of IS Statement of mgmt Commitment Framework for approaching risk & Controls Brief Explanation of Policies, minimally covering regulatory compliance, training / awareness business continuity , & consequences of violations Allocation of Responsibility, including reporting security incidents References to more detailed documents
Policy Documentations  Policy Direction For controls Procedures Detailed Steps Standards a image of what is acceptable Guidelines Recommendations & Acceptable alternatives
Quotation  Life is a white paper so be neat & Clean.

More Related Content

Viewers also liked

PMTCT Q Data Review Meeting_Kigoma
PMTCT Q Data Review Meeting_KigomaPMTCT Q Data Review Meeting_Kigoma
PMTCT Q Data Review Meeting_Kigoma
VisualBee.com
 
MOCKTAIL
MOCKTAILMOCKTAIL
MOCKTAIL
VisualBee.com
 
Power Point
Power PointPower Point
Power Point
VisualBee.com
 
Invitation skp2014
Invitation skp2014Invitation skp2014
Invitation skp2014
emiliomerayo
 
Results
ResultsResults
Results
emiliomerayo
 
Palandoken 2014 results
Palandoken 2014 resultsPalandoken 2014 results
Palandoken 2014 resultsemiliomerayo
 
Teen talk & more!!
Teen talk & more!!Teen talk & more!!
Teen talk & more!!
VisualBee.com
 

Viewers also liked (8)

PMTCT Q Data Review Meeting_Kigoma
PMTCT Q Data Review Meeting_KigomaPMTCT Q Data Review Meeting_Kigoma
PMTCT Q Data Review Meeting_Kigoma
 
MOCKTAIL
MOCKTAILMOCKTAIL
MOCKTAIL
 
Power Point
Power PointPower Point
Power Point
 
Invitation skp2014
Invitation skp2014Invitation skp2014
Invitation skp2014
 
Results
ResultsResults
Results
 
Palandoken 2014 results
Palandoken 2014 resultsPalandoken 2014 results
Palandoken 2014 results
 
...
......
...
 
Teen talk & more!!
Teen talk & more!!Teen talk & more!!
Teen talk & more!!
 

Similar to IS Audit

Putting policy into practice
Putting policy into practicePutting policy into practice
Putting policy into practice
rm4dummies
 
Lynes Diagrams
Lynes DiagramsLynes Diagrams
Lynes Diagrams
rlynes
 
Breach response
Breach responseBreach response
Breach response
Claudiu Popa
 
Auditing Chapter 2
Auditing Chapter 2Auditing Chapter 2
Auditing Chapter 2
aaykhan
 
An IT Governance program
An IT Governance programAn IT Governance program
An IT Governance program
John Goodpasture
 
There are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managThere are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database manag
GrazynaBroyles24
 
Creating a compliance assessment program on a tight budget
Creating a compliance assessment program on a tight budgetCreating a compliance assessment program on a tight budget
Creating a compliance assessment program on a tight budget
Ashley Deuble
 
Jd hse supervisor (abu samra)
Jd  hse supervisor (abu samra)Jd  hse supervisor (abu samra)
Jd hse supervisor (abu samra)
Daryl Wake
 
Security policies
Security policiesSecurity policies
Security policies
Nishant Pahad
 
Accident Prevention in Food Service Hssm
Accident Prevention in Food Service HssmAccident Prevention in Food Service Hssm
Accident Prevention in Food Service Hssm
Positive Pepin
 
Chapter 3Business Continuity PlanningPlanning for Busi.docx
Chapter 3Business Continuity PlanningPlanning for Busi.docxChapter 3Business Continuity PlanningPlanning for Busi.docx
Chapter 3Business Continuity PlanningPlanning for Busi.docx
walterl4
 
Key Safety Initiatives1
Key Safety Initiatives1Key Safety Initiatives1
Key Safety Initiatives1
wallstreet1
 
Key Safety Initiatives1
Key Safety Initiatives1Key Safety Initiatives1
Key Safety Initiatives1
wallstreet1
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
AlliedConSapCourses
 
CV_Tristan 09-02-2016
CV_Tristan 09-02-2016CV_Tristan 09-02-2016
CV_Tristan 09-02-2016
TRISTAN GARCIA
 
IT Governance.pptx
IT Governance.pptxIT Governance.pptx
IT Governance.pptx
Faith Shimba
 
IT Governance Day IT alignment to strategy by Hernan Huwyler
IT Governance Day IT alignment to strategy by Hernan HuwylerIT Governance Day IT alignment to strategy by Hernan Huwyler
IT Governance Day IT alignment to strategy by Hernan Huwyler
HernanHuw
 
What are policies procedures guidelines standards
What are policies procedures guidelines standardsWhat are policies procedures guidelines standards
What are policies procedures guidelines standards
Manish Chaurasia
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
ImXaib
 
SPE Paper ARMS Ltd
SPE Paper ARMS LtdSPE Paper ARMS Ltd
SPE Paper ARMS Ltd
John Tucker
 

Similar to IS Audit (20)

Putting policy into practice
Putting policy into practicePutting policy into practice
Putting policy into practice
 
Lynes Diagrams
Lynes DiagramsLynes Diagrams
Lynes Diagrams
 
Breach response
Breach responseBreach response
Breach response
 
Auditing Chapter 2
Auditing Chapter 2Auditing Chapter 2
Auditing Chapter 2
 
An IT Governance program
An IT Governance programAn IT Governance program
An IT Governance program
 
There are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managThere are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database manag
 
Creating a compliance assessment program on a tight budget
Creating a compliance assessment program on a tight budgetCreating a compliance assessment program on a tight budget
Creating a compliance assessment program on a tight budget
 
Jd hse supervisor (abu samra)
Jd  hse supervisor (abu samra)Jd  hse supervisor (abu samra)
Jd hse supervisor (abu samra)
 
Security policies
Security policiesSecurity policies
Security policies
 
Accident Prevention in Food Service Hssm
Accident Prevention in Food Service HssmAccident Prevention in Food Service Hssm
Accident Prevention in Food Service Hssm
 
Chapter 3Business Continuity PlanningPlanning for Busi.docx
Chapter 3Business Continuity PlanningPlanning for Busi.docxChapter 3Business Continuity PlanningPlanning for Busi.docx
Chapter 3Business Continuity PlanningPlanning for Busi.docx
 
Key Safety Initiatives1
Key Safety Initiatives1Key Safety Initiatives1
Key Safety Initiatives1
 
Key Safety Initiatives1
Key Safety Initiatives1Key Safety Initiatives1
Key Safety Initiatives1
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
CV_Tristan 09-02-2016
CV_Tristan 09-02-2016CV_Tristan 09-02-2016
CV_Tristan 09-02-2016
 
IT Governance.pptx
IT Governance.pptxIT Governance.pptx
IT Governance.pptx
 
IT Governance Day IT alignment to strategy by Hernan Huwyler
IT Governance Day IT alignment to strategy by Hernan HuwylerIT Governance Day IT alignment to strategy by Hernan Huwyler
IT Governance Day IT alignment to strategy by Hernan Huwyler
 
What are policies procedures guidelines standards
What are policies procedures guidelines standardsWhat are policies procedures guidelines standards
What are policies procedures guidelines standards
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
SPE Paper ARMS Ltd
SPE Paper ARMS LtdSPE Paper ARMS Ltd
SPE Paper ARMS Ltd
 

More from VisualBee.com

Homenagem para luiz e marcos (shared using VisualBee)
Homenagem para luiz e marcos 
 (shared using VisualBee)Homenagem para luiz e marcos 
 (shared using VisualBee)
Homenagem para luiz e marcos (shared using VisualBee)
VisualBee.com
 
PowerPoint Presentation (shared using VisualBee)
PowerPoint Presentation (shared using VisualBee)PowerPoint Presentation (shared using VisualBee)
PowerPoint Presentation (shared using VisualBee)VisualBee.com
 
PowerPoint Presentation (shared using http://VisualBee.com). (shared using Vi...
PowerPoint Presentation (shared using http://VisualBee.com). (shared using Vi...PowerPoint Presentation (shared using http://VisualBee.com). (shared using Vi...
PowerPoint Presentation (shared using http://VisualBee.com). (shared using Vi...
VisualBee.com
 
The bible and I (shared using VisualBee)
The bible and I (shared using VisualBee)The bible and I (shared using VisualBee)
The bible and I (shared using VisualBee)VisualBee.com
 
bb (shared using VisualBee)
bb  
(shared using VisualBee)bb  
(shared using VisualBee)
bb (shared using VisualBee)VisualBee.com
 
loki
lokiloki
ASH WEDNESDAY
ASH WEDNESDAYASH WEDNESDAY
ASH WEDNESDAY
VisualBee.com
 
hijospreferidos
hijospreferidoshijospreferidos
hijospreferidos
VisualBee.com
 
hijo preferido
hijo preferidohijo preferido
hijo preferido
VisualBee.com
 
Alcoholismo
AlcoholismoAlcoholismo
Alcoholismo
VisualBee.com
 
Chua nhat III mua Thuong Nien - Nam C
Chua nhat III mua Thuong Nien - Nam CChua nhat III mua Thuong Nien - Nam C
Chua nhat III mua Thuong Nien - Nam CVisualBee.com
 
LA FE QUE AGRADA A DIOS
LA FE QUE AGRADA A DIOSLA FE QUE AGRADA A DIOS
LA FE QUE AGRADA A DIOS
VisualBee.com
 
Martin Luther king JR
Martin Luther king JRMartin Luther king JR
Martin Luther king JR
VisualBee.com
 
Diapositive 1 (shared using http://VisualBee.com).
Diapositive 1 (shared using http://VisualBee.com).Diapositive 1 (shared using http://VisualBee.com).
Diapositive 1 (shared using http://VisualBee.com).VisualBee.com
 
my cara de empanaaa
my cara de empanaaamy cara de empanaaa
my cara de empanaaa
VisualBee.com
 

More from VisualBee.com (20)

Homenagem para luiz e marcos (shared using VisualBee)
Homenagem para luiz e marcos 
 (shared using VisualBee)Homenagem para luiz e marcos 
 (shared using VisualBee)
Homenagem para luiz e marcos (shared using VisualBee)
 
PowerPoint Presentation (shared using VisualBee)
PowerPoint Presentation (shared using VisualBee)PowerPoint Presentation (shared using VisualBee)
PowerPoint Presentation (shared using VisualBee)
 
PowerPoint Presentation (shared using http://VisualBee.com). (shared using Vi...
PowerPoint Presentation (shared using http://VisualBee.com). (shared using Vi...PowerPoint Presentation (shared using http://VisualBee.com). (shared using Vi...
PowerPoint Presentation (shared using http://VisualBee.com). (shared using Vi...
 
The bible and I (shared using VisualBee)
The bible and I (shared using VisualBee)The bible and I (shared using VisualBee)
The bible and I (shared using VisualBee)
 
bb bb b
bb bb bbb bb b
bb bb b
 
bb (shared using VisualBee)
bb  
(shared using VisualBee)bb  
(shared using VisualBee)
bb (shared using VisualBee)
 
bb
bbbb
bb
 
loki
lokiloki
loki
 
ASH WEDNESDAY
ASH WEDNESDAYASH WEDNESDAY
ASH WEDNESDAY
 
hijospreferidos
hijospreferidoshijospreferidos
hijospreferidos
 
yo
yoyo
yo
 
hijo preferido
hijo preferidohijo preferido
hijo preferido
 
Alcoholismo
AlcoholismoAlcoholismo
Alcoholismo
 
west love
west lovewest love
west love
 
jaa
jaajaa
jaa
 
Chua nhat III mua Thuong Nien - Nam C
Chua nhat III mua Thuong Nien - Nam CChua nhat III mua Thuong Nien - Nam C
Chua nhat III mua Thuong Nien - Nam C
 
LA FE QUE AGRADA A DIOS
LA FE QUE AGRADA A DIOSLA FE QUE AGRADA A DIOS
LA FE QUE AGRADA A DIOS
 
Martin Luther king JR
Martin Luther king JRMartin Luther king JR
Martin Luther king JR
 
Diapositive 1 (shared using http://VisualBee.com).
Diapositive 1 (shared using http://VisualBee.com).Diapositive 1 (shared using http://VisualBee.com).
Diapositive 1 (shared using http://VisualBee.com).
 
my cara de empanaaa
my cara de empanaaamy cara de empanaaa
my cara de empanaaa
 

Recently uploaded

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

IS Audit

  • 1. PRESENTER Engr. KAPIL DEV
  • 2. COURSE OUTLINE Polices Security Policy Security Policy Document Policy Documentation
  • 3. POLICIES High level documents describes Org. values & Strategy of Stakeholders/Senior Mgmt Represents General Goals, Directions, Objectives & Vision. Lower Level Policies for divisions, with a top to down approach from high level documents.Management must reassess policies regulatory for updating for new mandates, technologies, regulations , strucures. Is auditors will focus on information Security policy.
  • 4. Security Policy Policy= First step to developing security infrastructure Set direction for implementation of controls tools procedures Approved by senior mgmt. Documented & communicated to all employees & associates
  • 5. Security Policy Document Definition of IS Statement of mgmt Commitment Framework for approaching risk & Controls Brief Explanation of Policies, minimally covering regulatory compliance, training / awareness business continuity , & consequences of violations Allocation of Responsibility, including reporting security incidents References to more detailed documents
  • 6. Policy Documentations Policy Direction For controls Procedures Detailed Steps Standards a image of what is acceptable Guidelines Recommendations & Acceptable alternatives
  • 7. Quotation Life is a white paper so be neat & Clean.