SlideShare a Scribd company logo
Compliance & Control, Systems & Partner Relationship
                                       Management




                                Mahesh Patwardhan
                                maheshpatwardhan@rediffmail.com
Information
                                                       Office



                     Office of                                                              Technology
                    Compliance                                   Systems                      Partner
                    and Control                                                              Relations


                                                                                      Partner
                             Change       Policy                        Ops and                     Contract
Information   Access                                 Build and                      Relationship
                            Managemen   Managemen                      Maintenanc                  Managemen
  Security    Control                                 Deploy                        Managemen
                                t           t                              e                           t
                                                                                          t
Compliance and Control: Information Security

 Information Security Office

 Chief Information Security Officer
      Implement the Information Security Policy
      Implement the Access Control Policy
      Implement the Backup/Restoration Policy
      Conduct Information Security Office Meetings
      All meetings to be recorded (MOM)

 Conduct Reviews
      Security, Access Control, AUP, B&R, DR Policy
      Record all Policy Reviews (MOM)
      Policies to be updated and approved
      Updates to policies to be logged
Compliance and Control: Information Security

 Communication:
    Information Security Policy and Access Control Policy updates to all
     employees periodically.
    HR Training calendar for Security and Appropriate Usage sessions.
    Conduct Security Awareness and Appropriate Sessions for new
     joinees.

 Monitoring
    Review of System Exception Logs, Unauthorized Logins,
     Authorized Users lists
    All Reviews to be logged and the review reports with findings
     signed off on.
    Action taken report to be reviewed and signed off-on.
Compliance and Control: Information Security

 Define
   Data Backup/Restoration Process
   Recovery Testing Process
   Data securing process (tape-to-bank)

 Review
     Data Backup/Restoration Process
     Recovery Testing Process
     Data securing process (tape-to-bank)
     Backup/Restoration/Recovery Testing Log Sheet
     Monthly Tape-To-Bank Log Sheet
     All reviews to be recorded (MOM)
Access Control
Creation/Deletion of User IDs /privilege grants process

    Request for user id        Request for user id               Authorized
    creation / deletion        creation / deletion               Request (email
                               authorized by                     and hardcopy)
    raised by business
                               business unit Head                approved by
    unit mgr.                                                    Head - IO


    Request from HR
    for domain/email ID                                           Hardcopy of
                                                                  Authorized               Confirmation
                                                                  Request                  sent for granting
                                                                  Filed by Mgr – IS &
                                                                  App and Server
                                                                                           requested
    Request for temporary                                         Access Auth Matrix       Privileges/access
    unprivileged access                                           Updated
    To server raised by
    user


                                                     Email/Domain                 Application User
   Request for privileged                            Login                        Login
   Access on server raised
                              Request
                                                     Created/Removed              Created/Removed
   By NOC/Engineering         Authorized             By Manager - IT              by Manager: IS
   team                       By CTO
Access Control
Authorizations Filing
                                                        Authorization
                                                            Filing
                                                        Manager
                                                    Process & Control


                                           Email / Domain         Privileged Access
              Application Users                                                             Temporary Access
                                               Users                     Users
               Authorizations                                                                 Authorizations
                                            Authorizations         Authorizations



    Signed                      Signed                                             Signed                   Signed
  Authorization               Authorization                                      Authorization            Authorization
      Form                       Form                                               Form                     Form



 User Creation /             User Creation /
    Removal                     Removal
      Log                         Log



   Application
                             Email / Domain
  Authorization
                               Users List
     Matrix
Office of Compliance and Control:
Change Management

 Periodic Review of
      Change Management Process.
      Change Requests submitted.
      Change Request Approvals
      Pending deployments

 Review Meetings minutes to be recorded and the findings of the review
  documented

 Review Report with recommendations for re-mediation submitted,
  report approved.

 Approved recommendations carried out.

 Review of re-mediation carried out, approved and signed-off on.
Office of Compliance and Control:
Policy Management

 Information Steering Committee (ISC)
 Policy Reviews and Updates
 Schedule for ISC and Policy Reviews
 Conduct Reviews, report submission.
 Report Approvals, Policy updated and approved.
Information Office Hierarchy
                                                                Head – Information
                                                                     Office



                                           Chief
                                    Information Security          Information                 Director
                                          Officer                    Office             Information Systems




         Sr. Mgr        Office of                             Sr. Mgr                           Sr. Mgr        Technology
       Compliance &                                        Info. Systems                         Vendor          Partner
         Control
                       Compliance                                                               Relations
                                                                            Systems                             Relations
                            &                                                                                 (Engineering
                         Control                                                                                 Office)




 Information                                                                                          Partner
                  Access      Change            Policy             Build and           Ops &                          Contract
   Security                                                                                         Relationship
                  Control     Control         Management            Deploy           Maintenance                     Management
                                                                                                    Management

More Related Content

What's hot

CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
IBM Sverige
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simply
Lilian Schaffer
 
Touchcom Sales Presentation
Touchcom Sales PresentationTouchcom Sales Presentation
Touchcom Sales Presentation
ewickline
 
Tcg Veriam Slm Intro Deck
Tcg Veriam Slm Intro DeckTcg Veriam Slm Intro Deck
Tcg Veriam Slm Intro Deck
Kamila_W
 
Final cms id mu1 b-5 3 senior leader summary-6-26-12_
Final cms id mu1 b-5 3 senior leader summary-6-26-12_Final cms id mu1 b-5 3 senior leader summary-6-26-12_
Final cms id mu1 b-5 3 senior leader summary-6-26-12_
Master Chief Petty Officer of the Navy
 
Detailed Total Enrollment
Detailed  Total  EnrollmentDetailed  Total  Enrollment
Detailed Total Enrollment
treyreeves1953
 
Enhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor AuthenticationEnhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor Authentication
Novell
 
Technology Enhanced RCM
Technology Enhanced RCMTechnology Enhanced RCM
Technology Enhanced RCM
MaggieLewis
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud final
OracleIDM
 
Healthcare overview
Healthcare overviewHealthcare overview
Healthcare overview
Zensar Technologies Ltd.
 
Embracing the Convergence of IT Service & Asset Management
Embracing the Convergence of IT Service & Asset ManagementEmbracing the Convergence of IT Service & Asset Management
Embracing the Convergence of IT Service & Asset Management
BMC Software
 
Barclay rae itsmf itsm12 presentation nov 2012
Barclay rae itsmf itsm12 presentation nov 2012Barclay rae itsmf itsm12 presentation nov 2012
Barclay rae itsmf itsm12 presentation nov 2012
Barclay Rae
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcast
OracleIDM
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
sleterrier
 
Iraje brochure v17 master
Iraje brochure v17 masterIraje brochure v17 master
Iraje brochure v17 master
Mechsoft Technologies LLC
 

What's hot (15)

CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simply
 
Touchcom Sales Presentation
Touchcom Sales PresentationTouchcom Sales Presentation
Touchcom Sales Presentation
 
Tcg Veriam Slm Intro Deck
Tcg Veriam Slm Intro DeckTcg Veriam Slm Intro Deck
Tcg Veriam Slm Intro Deck
 
Final cms id mu1 b-5 3 senior leader summary-6-26-12_
Final cms id mu1 b-5 3 senior leader summary-6-26-12_Final cms id mu1 b-5 3 senior leader summary-6-26-12_
Final cms id mu1 b-5 3 senior leader summary-6-26-12_
 
Detailed Total Enrollment
Detailed  Total  EnrollmentDetailed  Total  Enrollment
Detailed Total Enrollment
 
Enhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor AuthenticationEnhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor Authentication
 
Technology Enhanced RCM
Technology Enhanced RCMTechnology Enhanced RCM
Technology Enhanced RCM
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud final
 
Healthcare overview
Healthcare overviewHealthcare overview
Healthcare overview
 
Embracing the Convergence of IT Service & Asset Management
Embracing the Convergence of IT Service & Asset ManagementEmbracing the Convergence of IT Service & Asset Management
Embracing the Convergence of IT Service & Asset Management
 
Barclay rae itsmf itsm12 presentation nov 2012
Barclay rae itsmf itsm12 presentation nov 2012Barclay rae itsmf itsm12 presentation nov 2012
Barclay rae itsmf itsm12 presentation nov 2012
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcast
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
 
Iraje brochure v17 master
Iraje brochure v17 masterIraje brochure v17 master
Iraje brochure v17 master
 

Viewers also liked

Cloud computing for signature management
Cloud computing for signature managementCloud computing for signature management
Cloud computing for signature management
isigma, firma electrónica
 
Printing & copying
Printing & copyingPrinting & copying
Printing & copying
Naomi Elliott
 
IBOR Middle Office Information Delivery
IBOR Middle Office Information DeliveryIBOR Middle Office Information Delivery
IBOR Middle Office Information Delivery
Burak S. Arikan
 
Ka Ni Kanichihk IOAA Program Information Session
Ka Ni Kanichihk IOAA Program Information SessionKa Ni Kanichihk IOAA Program Information Session
Ka Ni Kanichihk IOAA Program Information Session
Ka Ni Kanichihk Inc
 
Lecture1 (is342) (office automationsystems)
Lecture1  (is342) (office automationsystems)Lecture1  (is342) (office automationsystems)
Lecture1 (is342) (office automationsystems)
Taibah University, College of Computer Science & Engineering
 
AWS re:Invent 2016: Add User Sign-In, User Management, and Security to your M...
AWS re:Invent 2016: Add User Sign-In, User Management, and Security to your M...AWS re:Invent 2016: Add User Sign-In, User Management, and Security to your M...
AWS re:Invent 2016: Add User Sign-In, User Management, and Security to your M...
Amazon Web Services
 
Office Automation System
Office Automation SystemOffice Automation System
Office Automation System
university of education,Lahore
 
Office automation sysmtems
Office automation sysmtemsOffice automation sysmtems
Office automation sysmtems
Midhun chakkaravarthy
 
Office automation system
Office automation systemOffice automation system
Office automation system
Milan Padariya
 

Viewers also liked (9)

Cloud computing for signature management
Cloud computing for signature managementCloud computing for signature management
Cloud computing for signature management
 
Printing & copying
Printing & copyingPrinting & copying
Printing & copying
 
IBOR Middle Office Information Delivery
IBOR Middle Office Information DeliveryIBOR Middle Office Information Delivery
IBOR Middle Office Information Delivery
 
Ka Ni Kanichihk IOAA Program Information Session
Ka Ni Kanichihk IOAA Program Information SessionKa Ni Kanichihk IOAA Program Information Session
Ka Ni Kanichihk IOAA Program Information Session
 
Lecture1 (is342) (office automationsystems)
Lecture1  (is342) (office automationsystems)Lecture1  (is342) (office automationsystems)
Lecture1 (is342) (office automationsystems)
 
AWS re:Invent 2016: Add User Sign-In, User Management, and Security to your M...
AWS re:Invent 2016: Add User Sign-In, User Management, and Security to your M...AWS re:Invent 2016: Add User Sign-In, User Management, and Security to your M...
AWS re:Invent 2016: Add User Sign-In, User Management, and Security to your M...
 
Office Automation System
Office Automation SystemOffice Automation System
Office Automation System
 
Office automation sysmtems
Office automation sysmtemsOffice automation sysmtems
Office automation sysmtems
 
Office automation system
Office automation systemOffice automation system
Office automation system
 

Similar to Model Information Office

AM Side details
AM Side detailsAM Side details
AM Side details
Randhir Singh
 
The Information Office
The Information OfficeThe Information Office
The Information Office
Mahesh Patwardhan
 
Workflow Manager for Software License Optimization
Workflow Manager for Software License OptimizationWorkflow Manager for Software License Optimization
Workflow Manager for Software License Optimization
Flexera
 
5.5 incorporating security in it solutions (mauritius)
5.5 incorporating security in it solutions (mauritius)5.5 incorporating security in it solutions (mauritius)
5.5 incorporating security in it solutions (mauritius)
Corporate Registers Forum
 
Intro to Identity Management
Intro to Identity ManagementIntro to Identity Management
Intro to Identity Management
Hitachi ID Systems, Inc.
 
20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx
Anand Dhouni
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industry
Ajit Dadresa
 
What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0
Novell
 
Keeping it Simple with Permission Sets
Keeping it Simple with Permission SetsKeeping it Simple with Permission Sets
Keeping it Simple with Permission Sets
Configero
 
Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
Guang Ying Yuan
 
Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)
Microsoft Norge AS
 
User Manager
User ManagerUser Manager
User Manager
EmpowerID
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
ruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
ruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
ruiruitang
 
What's New in Maximo 7 Workshop Alex Estevam Sep 2012
What's New in Maximo 7 Workshop   Alex Estevam Sep 2012What's New in Maximo 7 Workshop   Alex Estevam Sep 2012
What's New in Maximo 7 Workshop Alex Estevam Sep 2012
alipaiva
 
Creating Intelligent Enterprises with Unified Aftermarket Services by Tavant ...
Creating Intelligent Enterprises with Unified Aftermarket Services by Tavant ...Creating Intelligent Enterprises with Unified Aftermarket Services by Tavant ...
Creating Intelligent Enterprises with Unified Aftermarket Services by Tavant ...
Tavant Technologies Inc.
 
TechEd 2012 NA - MGT332 - fighting fire to the cloud!
TechEd 2012 NA - MGT332 - fighting fire to the cloud!TechEd 2012 NA - MGT332 - fighting fire to the cloud!
TechEd 2012 NA - MGT332 - fighting fire to the cloud!
wwwally
 
Dreamforce'12 - Automate Business Processes with Force.com
Dreamforce'12 - Automate Business Processes with Force.comDreamforce'12 - Automate Business Processes with Force.com
Dreamforce'12 - Automate Business Processes with Force.com
Mudit Agarwal
 
Transforming IT - ITaaS Onboarding
Transforming IT - ITaaS   OnboardingTransforming IT - ITaaS   Onboarding
Transforming IT - ITaaS Onboarding
Jerry Jermann
 

Similar to Model Information Office (20)

AM Side details
AM Side detailsAM Side details
AM Side details
 
The Information Office
The Information OfficeThe Information Office
The Information Office
 
Workflow Manager for Software License Optimization
Workflow Manager for Software License OptimizationWorkflow Manager for Software License Optimization
Workflow Manager for Software License Optimization
 
5.5 incorporating security in it solutions (mauritius)
5.5 incorporating security in it solutions (mauritius)5.5 incorporating security in it solutions (mauritius)
5.5 incorporating security in it solutions (mauritius)
 
Intro to Identity Management
Intro to Identity ManagementIntro to Identity Management
Intro to Identity Management
 
20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industry
 
What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0
 
Keeping it Simple with Permission Sets
Keeping it Simple with Permission SetsKeeping it Simple with Permission Sets
Keeping it Simple with Permission Sets
 
Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
 
Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)
 
User Manager
User ManagerUser Manager
User Manager
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
What's New in Maximo 7 Workshop Alex Estevam Sep 2012
What's New in Maximo 7 Workshop   Alex Estevam Sep 2012What's New in Maximo 7 Workshop   Alex Estevam Sep 2012
What's New in Maximo 7 Workshop Alex Estevam Sep 2012
 
Creating Intelligent Enterprises with Unified Aftermarket Services by Tavant ...
Creating Intelligent Enterprises with Unified Aftermarket Services by Tavant ...Creating Intelligent Enterprises with Unified Aftermarket Services by Tavant ...
Creating Intelligent Enterprises with Unified Aftermarket Services by Tavant ...
 
TechEd 2012 NA - MGT332 - fighting fire to the cloud!
TechEd 2012 NA - MGT332 - fighting fire to the cloud!TechEd 2012 NA - MGT332 - fighting fire to the cloud!
TechEd 2012 NA - MGT332 - fighting fire to the cloud!
 
Dreamforce'12 - Automate Business Processes with Force.com
Dreamforce'12 - Automate Business Processes with Force.comDreamforce'12 - Automate Business Processes with Force.com
Dreamforce'12 - Automate Business Processes with Force.com
 
Transforming IT - ITaaS Onboarding
Transforming IT - ITaaS   OnboardingTransforming IT - ITaaS   Onboarding
Transforming IT - ITaaS Onboarding
 

More from Mahesh Patwardhan

IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
Mahesh Patwardhan
 
Digital Landscape
Digital LandscapeDigital Landscape
Digital Landscape
Mahesh Patwardhan
 
Social Media Publishing & Aggregation
Social Media Publishing & AggregationSocial Media Publishing & Aggregation
Social Media Publishing & Aggregation
Mahesh Patwardhan
 
Social Media Metrics
Social Media MetricsSocial Media Metrics
Social Media Metrics
Mahesh Patwardhan
 
Social Media For A Sporting Event
Social Media For A Sporting EventSocial Media For A Sporting Event
Social Media For A Sporting Event
Mahesh Patwardhan
 
A Real Time Web Analytics System
A Real Time Web Analytics SystemA Real Time Web Analytics System
A Real Time Web Analytics System
Mahesh Patwardhan
 
Revenue Reconciliation System
Revenue Reconciliation SystemRevenue Reconciliation System
Revenue Reconciliation System
Mahesh Patwardhan
 
Business Analytics System
Business Analytics SystemBusiness Analytics System
Business Analytics System
Mahesh Patwardhan
 
Concept for a Facebook App for a Mexican Restaurant
Concept for a Facebook App for a Mexican RestaurantConcept for a Facebook App for a Mexican Restaurant
Concept for a Facebook App for a Mexican Restaurant
Mahesh Patwardhan
 
A concept for a facebook app
A concept for a facebook appA concept for a facebook app
A concept for a facebook app
Mahesh Patwardhan
 
Digital And New Media Strategy using Web 2.0
Digital And New Media Strategy using Web 2.0Digital And New Media Strategy using Web 2.0
Digital And New Media Strategy using Web 2.0
Mahesh Patwardhan
 
Digital And New Media Consultancy Services
Digital And New Media Consultancy ServicesDigital And New Media Consultancy Services
Digital And New Media Consultancy Services
Mahesh Patwardhan
 
Lets Build A Story
Lets Build A StoryLets Build A Story
Lets Build A Story
Mahesh Patwardhan
 
Social Media in Sports - some Case Studies
Social Media in Sports - some Case StudiesSocial Media in Sports - some Case Studies
Social Media in Sports - some Case Studies
Mahesh Patwardhan
 
Social Media - some case studies
Social Media - some case studiesSocial Media - some case studies
Social Media - some case studies
Mahesh Patwardhan
 

More from Mahesh Patwardhan (15)

IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
 
Digital Landscape
Digital LandscapeDigital Landscape
Digital Landscape
 
Social Media Publishing & Aggregation
Social Media Publishing & AggregationSocial Media Publishing & Aggregation
Social Media Publishing & Aggregation
 
Social Media Metrics
Social Media MetricsSocial Media Metrics
Social Media Metrics
 
Social Media For A Sporting Event
Social Media For A Sporting EventSocial Media For A Sporting Event
Social Media For A Sporting Event
 
A Real Time Web Analytics System
A Real Time Web Analytics SystemA Real Time Web Analytics System
A Real Time Web Analytics System
 
Revenue Reconciliation System
Revenue Reconciliation SystemRevenue Reconciliation System
Revenue Reconciliation System
 
Business Analytics System
Business Analytics SystemBusiness Analytics System
Business Analytics System
 
Concept for a Facebook App for a Mexican Restaurant
Concept for a Facebook App for a Mexican RestaurantConcept for a Facebook App for a Mexican Restaurant
Concept for a Facebook App for a Mexican Restaurant
 
A concept for a facebook app
A concept for a facebook appA concept for a facebook app
A concept for a facebook app
 
Digital And New Media Strategy using Web 2.0
Digital And New Media Strategy using Web 2.0Digital And New Media Strategy using Web 2.0
Digital And New Media Strategy using Web 2.0
 
Digital And New Media Consultancy Services
Digital And New Media Consultancy ServicesDigital And New Media Consultancy Services
Digital And New Media Consultancy Services
 
Lets Build A Story
Lets Build A StoryLets Build A Story
Lets Build A Story
 
Social Media in Sports - some Case Studies
Social Media in Sports - some Case StudiesSocial Media in Sports - some Case Studies
Social Media in Sports - some Case Studies
 
Social Media - some case studies
Social Media - some case studiesSocial Media - some case studies
Social Media - some case studies
 

Recently uploaded

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 

Recently uploaded (20)

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 

Model Information Office

  • 1. Compliance & Control, Systems & Partner Relationship Management Mahesh Patwardhan maheshpatwardhan@rediffmail.com
  • 2. Information Office Office of Technology Compliance Systems Partner and Control Relations Partner Change Policy Ops and Contract Information Access Build and Relationship Managemen Managemen Maintenanc Managemen Security Control Deploy Managemen t t e t t
  • 3. Compliance and Control: Information Security  Information Security Office  Chief Information Security Officer  Implement the Information Security Policy  Implement the Access Control Policy  Implement the Backup/Restoration Policy  Conduct Information Security Office Meetings  All meetings to be recorded (MOM)  Conduct Reviews  Security, Access Control, AUP, B&R, DR Policy  Record all Policy Reviews (MOM)  Policies to be updated and approved  Updates to policies to be logged
  • 4. Compliance and Control: Information Security  Communication:  Information Security Policy and Access Control Policy updates to all employees periodically.  HR Training calendar for Security and Appropriate Usage sessions.  Conduct Security Awareness and Appropriate Sessions for new joinees.  Monitoring  Review of System Exception Logs, Unauthorized Logins, Authorized Users lists  All Reviews to be logged and the review reports with findings signed off on.  Action taken report to be reviewed and signed off-on.
  • 5. Compliance and Control: Information Security  Define  Data Backup/Restoration Process  Recovery Testing Process  Data securing process (tape-to-bank)  Review  Data Backup/Restoration Process  Recovery Testing Process  Data securing process (tape-to-bank)  Backup/Restoration/Recovery Testing Log Sheet  Monthly Tape-To-Bank Log Sheet  All reviews to be recorded (MOM)
  • 6. Access Control Creation/Deletion of User IDs /privilege grants process Request for user id Request for user id Authorized creation / deletion creation / deletion Request (email authorized by and hardcopy) raised by business business unit Head approved by unit mgr. Head - IO Request from HR for domain/email ID Hardcopy of Authorized Confirmation Request sent for granting Filed by Mgr – IS & App and Server requested Request for temporary Access Auth Matrix Privileges/access unprivileged access Updated To server raised by user Email/Domain Application User Request for privileged Login Login Access on server raised Request Created/Removed Created/Removed By NOC/Engineering Authorized By Manager - IT by Manager: IS team By CTO
  • 7. Access Control Authorizations Filing Authorization Filing Manager Process & Control Email / Domain Privileged Access Application Users Temporary Access Users Users Authorizations Authorizations Authorizations Authorizations Signed Signed Signed Signed Authorization Authorization Authorization Authorization Form Form Form Form User Creation / User Creation / Removal Removal Log Log Application Email / Domain Authorization Users List Matrix
  • 8. Office of Compliance and Control: Change Management  Periodic Review of  Change Management Process.  Change Requests submitted.  Change Request Approvals  Pending deployments  Review Meetings minutes to be recorded and the findings of the review documented  Review Report with recommendations for re-mediation submitted, report approved.  Approved recommendations carried out.  Review of re-mediation carried out, approved and signed-off on.
  • 9. Office of Compliance and Control: Policy Management  Information Steering Committee (ISC)  Policy Reviews and Updates  Schedule for ISC and Policy Reviews  Conduct Reviews, report submission.  Report Approvals, Policy updated and approved.
  • 10. Information Office Hierarchy Head – Information Office Chief Information Security Information Director Officer Office Information Systems Sr. Mgr Office of Sr. Mgr Sr. Mgr Technology Compliance & Info. Systems Vendor Partner Control Compliance Relations Systems Relations & (Engineering Control Office) Information Partner Access Change Policy Build and Ops & Contract Security Relationship Control Control Management Deploy Maintenance Management Management