application , business , projects , security

Project Approach – Plan Build and Run

September 14, 2012

Plan

Develop the Security Architecture strategy to address the demands of stakeholders while also considering available resources

  • Task & improvement request management
  • Prioritization of tasks and requests
  • Determine service levels
  • Evaluate operational metrics and measure achievement of goals
  • Assign and manage resources
  • Security Architecture governance

Build

Design and implement the technology and business processes necessary to control access to information as directed by the Plan function

  • Architect and configure Security Architecture technologies
  • Design business processes for managing, reporting, and re-certifying access
  • Conduct user and Security training and other change management functions
  • Conduct systems and process testing and schedule releases
  • Design access controls such as roles, policies, and rules

Run

Provide the right access to the right people at the right time, report on that access, and continuously ensure the right access is provided

  • Operate Security Architecture technologies, automated business processes, and manual business processes
  • Monitor and report on SLAs and other metrics
  • Respond to incidents and other high-priority items
  • Discover areas for improvements and report them to the Plan function
  • Respond to customer requests (within the normal scope of operations)

Document the practical governance process for others to follow

  • Document goals and objectives for the governance model and communicate them to each stakeholder

https://www.bestitdocuments.com/Samples