What you should look for in your Security Management and Administration
June 22, 2012Overall:
Ensure your information security policy is aligned to ISO 2700x Information Security Standards. The highlights of what you should look for:
- Prepare and implement the Information Security Policies of your organization.
- Defining roles and responsibilities for information security across the organization, in co-operation with security representatives from your organization IT department / business units.
- Identifying controls and coordinating their implementation, in co-operation with security representatives from the affected departments periodically assessing the adequacy of information security implementation across the organization.
- Auditing internal systems and processes for compliance with security policies and standards.
- Validating all connectivity requirements from a security perspective.
- Anchoring security initiatives within your organization and promoting information security throughout the enterprise.
- Understanding / analyzing the Identity & access management requirements & implementing the same.
- Constantly reviewing the security compliance objectives and revisiting the controls that need to be implemented to meet the appropriate control objectives.
- Service window 24×7 on Seat with a combination of both onsite and offshore locations.
Typical Security activities:
- Enforcing a strong password policy.
- Physical Access Control.
- Data Center / Server Room Security.
- Creation & Control of user accounts.
- Corporate Project Data Access control
- Managing users for Access management.
- Third-Party Connections which will include Firewall policies, IPS/IDS.
- Virus Protection.
- Audit and Compliance.
- Vulnerability monitoring, assessment and Penetration testing.
- Firewall, IDS/IPS, Antivirus monitoring and management.
- Internet access control.
- Encryption keys management.
www.bestitdocuments.com