SlideShare a Scribd company logo
Cyber Governance
Control Objective Statement - Controls provide reasonable assurance that the information
system is adequately designed, implemented, administered and maintained by qualified I.T.
personnel. Controls allow access to information based on clear and enforced policies to
preserved integrity and protect informational resources and the network infrastructure from
unauthorized access .
Regulations
(ex. PIPEDA,
PCI DSS, SOX)
Management
Policy (ex. Information Protection)
Example of statement we can find in this type of policy
Statement: a subject or an object must only be granted access to Information he has the need to know/use
according to its role or requirements (ex. Services). Adequate preventive, detective and corrective operational,
management, technical and physical controls must be present, in good working order and verified periodically to
ensure their effectiveness.
Internal
Requirements
(ex. Business
Continuity)
Architecture
According to the policy statement, a standard can be defined
Process with role and responsibility (ex. employee, contractor, third party);
Collaborate with IT Operation to develop standard practices;
Objects accessing the organizational information system, internally and externally (ex. services);
Network and security architecture (ex. segregation, zones);
IT Security requirements to be followed by operation while implementing the control (ex. Detailed configuration of
a solution).
IT Control Framework
Author: Marc-Andre Heroux
Version 1.1
Date: 11/01/2016
Classified: public
Document realized
according to guidance
from the following
organizations:
A control objective is a Governance statement setting
the direction in regards to IT, security as well as other
functions of the organization. They are mainly
formulated according to internal requirements and
regulations to comply with.
Information Protection Policy
Information protection policy is a document which expresses
management direction and support for information security
on the processing, storage and transmission of
sensitive information. Main goal is to ensure information is
adequately protected from modification or disclosure.
**Recommended to be signed by every employee
**Availability is usually under Business continuity
management policy
Procedures can describe step by step specific task to be executed (ex. firmware
upgrade). Practices can describe how to conduct the operation, but are not step by step
document such as procedures; it allows activities to be conducted in a similar way.
Operation
Implementation of a control according the architecture/standard defined
IT Operation implement , operate, maintain and monitor the control.

More Related Content

What's hot

Lesson 4
Lesson 4Lesson 4
Lesson 2
Lesson 2Lesson 2
Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
MLG College of Learning, Inc
 
Chapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptChapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.ppt
Shruthi48
 
Information Security
Information Security Information Security
Information Security
Alok Katiyar
 
Lesson 3
Lesson 3Lesson 3
Introduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaIntroduction to information security - by Ivan Nganda
Introduction to information security - by Ivan Nganda
See You Rise Holdings
 
CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1
Hamed Moghaddam
 
Network security policies
Network security policiesNetwork security policies
Network security policies
Usman Mukhtar
 
Lesson 2
Lesson 2Lesson 2
Chapter 4 Risk Management.pptx
Chapter 4 Risk Management.pptxChapter 4 Risk Management.pptx
Chapter 4 Risk Management.pptx
Shruthi48
 
Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
MLG College of Learning, Inc
 
Lesson 3- Fair Approach
Lesson 3- Fair ApproachLesson 3- Fair Approach
Lesson 3- Fair Approach
MLG College of Learning, Inc
 
IT Governance Roles and Data Governance - Hernan Huwyler
IT Governance Roles and Data Governance - Hernan HuwylerIT Governance Roles and Data Governance - Hernan Huwyler
IT Governance Roles and Data Governance - Hernan Huwyler
Hernan Huwyler, MBA CPA
 
ISO_27001___2005_OASIS
ISO_27001___2005_OASISISO_27001___2005_OASIS
ISO_27001___2005_OASIS
Dermot Clarke
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
Shauna_Cox
 
Information security
Information securityInformation security
Information security
Sanjay Tiwari
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
amiable_indian
 
Legal-Ethical-Professionalin-IS.pptx
Legal-Ethical-Professionalin-IS.pptxLegal-Ethical-Professionalin-IS.pptx
Legal-Ethical-Professionalin-IS.pptx
Shruthi48
 
Lesson 2
Lesson 2Lesson 2

What's hot (20)

Lesson 4
Lesson 4Lesson 4
Lesson 4
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
 
Chapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptChapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.ppt
 
Information Security
Information Security Information Security
Information Security
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Introduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaIntroduction to information security - by Ivan Nganda
Introduction to information security - by Ivan Nganda
 
CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Chapter 4 Risk Management.pptx
Chapter 4 Risk Management.pptxChapter 4 Risk Management.pptx
Chapter 4 Risk Management.pptx
 
Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
 
Lesson 3- Fair Approach
Lesson 3- Fair ApproachLesson 3- Fair Approach
Lesson 3- Fair Approach
 
IT Governance Roles and Data Governance - Hernan Huwyler
IT Governance Roles and Data Governance - Hernan HuwylerIT Governance Roles and Data Governance - Hernan Huwyler
IT Governance Roles and Data Governance - Hernan Huwyler
 
ISO_27001___2005_OASIS
ISO_27001___2005_OASISISO_27001___2005_OASIS
ISO_27001___2005_OASIS
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Information security
Information securityInformation security
Information security
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Legal-Ethical-Professionalin-IS.pptx
Legal-Ethical-Professionalin-IS.pptxLegal-Ethical-Professionalin-IS.pptx
Legal-Ethical-Professionalin-IS.pptx
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 

Similar to IT Control Framework

Protecting business interests with policies for it asset management it-tool...
Protecting business interests with policies for it asset management   it-tool...Protecting business interests with policies for it asset management   it-tool...
Protecting business interests with policies for it asset management it-tool...
IT-Toolkits.org
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
ImXaib
 
Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...
Luxembourg Institute of Science and Technology
 
1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docx
durantheseldine
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
Mark Conway
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
codka
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
codka
 
Organizations rely heavily on the use of information technology (IT).docx
Organizations rely heavily on the use of information technology (IT).docxOrganizations rely heavily on the use of information technology (IT).docx
Organizations rely heavily on the use of information technology (IT).docx
aman341480
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
moggdede
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
Tony Hauxwell
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
phanleson
 
Fundamentals of data security policy in i.t. management it-toolkits
Fundamentals of data security policy in i.t. management   it-toolkitsFundamentals of data security policy in i.t. management   it-toolkits
Fundamentals of data security policy in i.t. management it-toolkits
IT-Toolkits.org
 
Security management.pptx
Security management.pptxSecurity management.pptx
Security management.pptx
AhmadUsman79
 
To meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, STo meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, S
TakishaPeck109
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
ashu6
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solution
Vivek Maurya
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
abhichowdary16
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Risk
amiable_indian
 
1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf
ChunLei(peter) Che
 
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxOperationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docx
amit657720
 

Similar to IT Control Framework (20)

Protecting business interests with policies for it asset management it-tool...
Protecting business interests with policies for it asset management   it-tool...Protecting business interests with policies for it asset management   it-tool...
Protecting business interests with policies for it asset management it-tool...
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...
 
1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docx
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Organizations rely heavily on the use of information technology (IT).docx
Organizations rely heavily on the use of information technology (IT).docxOrganizations rely heavily on the use of information technology (IT).docx
Organizations rely heavily on the use of information technology (IT).docx
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
Fundamentals of data security policy in i.t. management it-toolkits
Fundamentals of data security policy in i.t. management   it-toolkitsFundamentals of data security policy in i.t. management   it-toolkits
Fundamentals of data security policy in i.t. management it-toolkits
 
Security management.pptx
Security management.pptxSecurity management.pptx
Security management.pptx
 
To meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, STo meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, S
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solution
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Risk
 
1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf
 
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxOperationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docx
 

More from Marc-Andre Heroux

Linux encrypted container
Linux encrypted containerLinux encrypted container
Linux encrypted container
Marc-Andre Heroux
 
Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0
Marc-Andre Heroux
 
Online Authentication
Online AuthenticationOnline Authentication
Online Authentication
Marc-Andre Heroux
 
Monitoring your organization against threats - Critical System Control
Monitoring your organization against threats - Critical System ControlMonitoring your organization against threats - Critical System Control
Monitoring your organization against threats - Critical System Control
Marc-Andre Heroux
 
Frame - MAC Address Threats & Vulnerabilities
Frame - MAC Address Threats & VulnerabilitiesFrame - MAC Address Threats & Vulnerabilities
Frame - MAC Address Threats & Vulnerabilities
Marc-Andre Heroux
 
Modèle de sécurité organisationnelle
Modèle de sécurité organisationnelleModèle de sécurité organisationnelle
Modèle de sécurité organisationnelle
Marc-Andre Heroux
 
Méthodologie - adoption d'une norme en 7 étapes
Méthodologie - adoption d'une norme en 7 étapesMéthodologie - adoption d'une norme en 7 étapes
Méthodologie - adoption d'une norme en 7 étapes
Marc-Andre Heroux
 
BUSINESS MATURITY LIFE CYCLE
BUSINESS MATURITY LIFE CYCLEBUSINESS MATURITY LIFE CYCLE
BUSINESS MATURITY LIFE CYCLE
Marc-Andre Heroux
 
Assurance compliance management system
Assurance compliance management systemAssurance compliance management system
Assurance compliance management system
Marc-Andre Heroux
 

More from Marc-Andre Heroux (9)

Linux encrypted container
Linux encrypted containerLinux encrypted container
Linux encrypted container
 
Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0
 
Online Authentication
Online AuthenticationOnline Authentication
Online Authentication
 
Monitoring your organization against threats - Critical System Control
Monitoring your organization against threats - Critical System ControlMonitoring your organization against threats - Critical System Control
Monitoring your organization against threats - Critical System Control
 
Frame - MAC Address Threats & Vulnerabilities
Frame - MAC Address Threats & VulnerabilitiesFrame - MAC Address Threats & Vulnerabilities
Frame - MAC Address Threats & Vulnerabilities
 
Modèle de sécurité organisationnelle
Modèle de sécurité organisationnelleModèle de sécurité organisationnelle
Modèle de sécurité organisationnelle
 
Méthodologie - adoption d'une norme en 7 étapes
Méthodologie - adoption d'une norme en 7 étapesMéthodologie - adoption d'une norme en 7 étapes
Méthodologie - adoption d'une norme en 7 étapes
 
BUSINESS MATURITY LIFE CYCLE
BUSINESS MATURITY LIFE CYCLEBUSINESS MATURITY LIFE CYCLE
BUSINESS MATURITY LIFE CYCLE
 
Assurance compliance management system
Assurance compliance management systemAssurance compliance management system
Assurance compliance management system
 

Recently uploaded

9 Ways Managers Kill Morale (and What to Do Instead)
9 Ways Managers Kill Morale (and What to Do Instead)9 Ways Managers Kill Morale (and What to Do Instead)
9 Ways Managers Kill Morale (and What to Do Instead)
experienceprosarah
 
m249-saw PMI To familiarize the soldier with the M249 Squad Automatic Weapon ...
m249-saw PMI To familiarize the soldier with the M249 Squad Automatic Weapon ...m249-saw PMI To familiarize the soldier with the M249 Squad Automatic Weapon ...
m249-saw PMI To familiarize the soldier with the M249 Squad Automatic Weapon ...
LinghuaKong2
 
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Alexey Krivitsky
 
Customer Relationship Managemenet’s Impact on Customer Satisfaction and Perfo...
Customer Relationship Managemenet’s Impact on Customer Satisfaction and Perfo...Customer Relationship Managemenet’s Impact on Customer Satisfaction and Perfo...
Customer Relationship Managemenet’s Impact on Customer Satisfaction and Perfo...
Istanbul Beykent University (İstanbul Beykent Üniversitesi)
 
Maximize Your Efficiency with This Comprehensive Project Management Platform ...
Maximize Your Efficiency with This Comprehensive Project Management Platform ...Maximize Your Efficiency with This Comprehensive Project Management Platform ...
Maximize Your Efficiency with This Comprehensive Project Management Platform ...
SOFTTECHHUB
 
From Concept to reality : Implementing Lean Managements DMAIC Methodology for...
From Concept to reality : Implementing Lean Managements DMAIC Methodology for...From Concept to reality : Implementing Lean Managements DMAIC Methodology for...
From Concept to reality : Implementing Lean Managements DMAIC Methodology for...
Rokibul Hasan
 
A comprehensive-study-of-biparjoy-cyclone-disaster-management-in-gujarat-a-ca...
A comprehensive-study-of-biparjoy-cyclone-disaster-management-in-gujarat-a-ca...A comprehensive-study-of-biparjoy-cyclone-disaster-management-in-gujarat-a-ca...
A comprehensive-study-of-biparjoy-cyclone-disaster-management-in-gujarat-a-ca...
Samirsinh Parmar
 
Neal Elbaum Shares Top 5 Trends Shaping the Logistics Industry in 2024
Neal Elbaum Shares Top 5 Trends Shaping the Logistics Industry in 2024Neal Elbaum Shares Top 5 Trends Shaping the Logistics Industry in 2024
Neal Elbaum Shares Top 5 Trends Shaping the Logistics Industry in 2024
Neal Elbaum
 
Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd tes...
Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd tes...Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd tes...
Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd tes...
ssuserf63bd7
 
一比一原版(philau毕业证书)美国费城大学毕业证如何办理
一比一原版(philau毕业证书)美国费城大学毕业证如何办理一比一原版(philau毕业证书)美国费城大学毕业证如何办理
一比一原版(philau毕业证书)美国费城大学毕业证如何办理
nozaxy
 
team presentation of the role and responsibility of HSE teamreviewed.pptx
team presentation of the role and responsibility of HSE teamreviewed.pptxteam presentation of the role and responsibility of HSE teamreviewed.pptx
team presentation of the role and responsibility of HSE teamreviewed.pptx
ProsperOghalomeno1
 

Recently uploaded (11)

9 Ways Managers Kill Morale (and What to Do Instead)
9 Ways Managers Kill Morale (and What to Do Instead)9 Ways Managers Kill Morale (and What to Do Instead)
9 Ways Managers Kill Morale (and What to Do Instead)
 
m249-saw PMI To familiarize the soldier with the M249 Squad Automatic Weapon ...
m249-saw PMI To familiarize the soldier with the M249 Squad Automatic Weapon ...m249-saw PMI To familiarize the soldier with the M249 Squad Automatic Weapon ...
m249-saw PMI To familiarize the soldier with the M249 Squad Automatic Weapon ...
 
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
 
Customer Relationship Managemenet’s Impact on Customer Satisfaction and Perfo...
Customer Relationship Managemenet’s Impact on Customer Satisfaction and Perfo...Customer Relationship Managemenet’s Impact on Customer Satisfaction and Perfo...
Customer Relationship Managemenet’s Impact on Customer Satisfaction and Perfo...
 
Maximize Your Efficiency with This Comprehensive Project Management Platform ...
Maximize Your Efficiency with This Comprehensive Project Management Platform ...Maximize Your Efficiency with This Comprehensive Project Management Platform ...
Maximize Your Efficiency with This Comprehensive Project Management Platform ...
 
From Concept to reality : Implementing Lean Managements DMAIC Methodology for...
From Concept to reality : Implementing Lean Managements DMAIC Methodology for...From Concept to reality : Implementing Lean Managements DMAIC Methodology for...
From Concept to reality : Implementing Lean Managements DMAIC Methodology for...
 
A comprehensive-study-of-biparjoy-cyclone-disaster-management-in-gujarat-a-ca...
A comprehensive-study-of-biparjoy-cyclone-disaster-management-in-gujarat-a-ca...A comprehensive-study-of-biparjoy-cyclone-disaster-management-in-gujarat-a-ca...
A comprehensive-study-of-biparjoy-cyclone-disaster-management-in-gujarat-a-ca...
 
Neal Elbaum Shares Top 5 Trends Shaping the Logistics Industry in 2024
Neal Elbaum Shares Top 5 Trends Shaping the Logistics Industry in 2024Neal Elbaum Shares Top 5 Trends Shaping the Logistics Industry in 2024
Neal Elbaum Shares Top 5 Trends Shaping the Logistics Industry in 2024
 
Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd tes...
Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd tes...Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd tes...
Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd tes...
 
一比一原版(philau毕业证书)美国费城大学毕业证如何办理
一比一原版(philau毕业证书)美国费城大学毕业证如何办理一比一原版(philau毕业证书)美国费城大学毕业证如何办理
一比一原版(philau毕业证书)美国费城大学毕业证如何办理
 
team presentation of the role and responsibility of HSE teamreviewed.pptx
team presentation of the role and responsibility of HSE teamreviewed.pptxteam presentation of the role and responsibility of HSE teamreviewed.pptx
team presentation of the role and responsibility of HSE teamreviewed.pptx
 

IT Control Framework

  • 1. Cyber Governance Control Objective Statement - Controls provide reasonable assurance that the information system is adequately designed, implemented, administered and maintained by qualified I.T. personnel. Controls allow access to information based on clear and enforced policies to preserved integrity and protect informational resources and the network infrastructure from unauthorized access . Regulations (ex. PIPEDA, PCI DSS, SOX) Management Policy (ex. Information Protection) Example of statement we can find in this type of policy Statement: a subject or an object must only be granted access to Information he has the need to know/use according to its role or requirements (ex. Services). Adequate preventive, detective and corrective operational, management, technical and physical controls must be present, in good working order and verified periodically to ensure their effectiveness. Internal Requirements (ex. Business Continuity) Architecture According to the policy statement, a standard can be defined Process with role and responsibility (ex. employee, contractor, third party); Collaborate with IT Operation to develop standard practices; Objects accessing the organizational information system, internally and externally (ex. services); Network and security architecture (ex. segregation, zones); IT Security requirements to be followed by operation while implementing the control (ex. Detailed configuration of a solution). IT Control Framework Author: Marc-Andre Heroux Version 1.1 Date: 11/01/2016 Classified: public Document realized according to guidance from the following organizations: A control objective is a Governance statement setting the direction in regards to IT, security as well as other functions of the organization. They are mainly formulated according to internal requirements and regulations to comply with. Information Protection Policy Information protection policy is a document which expresses management direction and support for information security on the processing, storage and transmission of sensitive information. Main goal is to ensure information is adequately protected from modification or disclosure. **Recommended to be signed by every employee **Availability is usually under Business continuity management policy Procedures can describe step by step specific task to be executed (ex. firmware upgrade). Practices can describe how to conduct the operation, but are not step by step document such as procedures; it allows activities to be conducted in a similar way. Operation Implementation of a control according the architecture/standard defined IT Operation implement , operate, maintain and monitor the control.