Sample – Software Installation and Maintenance Architecture

Overall Architecture This section provides information on the Software Installation and Maintenance architecture. It discusses the architecture in terms of the software deployment phases that were introduced in the preceding section. Windows 200x Software Installation and Maintenance requires Windows 200x Server, Active Directory, Group Policy, and Windows 200x Professional.  Staging Computers: Bringing New PCs into… Continue reading Sample – Software Installation and Maintenance Architecture

Sample – Software Management Policy

Purpose Corporate licenses the use of computer software from a variety of outside companies. If Corporate does not own software or its related documentation, and unless authorized by the software vendor, does not have the right to reproduce it except for backup purposes. The unauthorized or improper use or reproduction of software may constitute a… Continue reading Sample – Software Management Policy

Sample – Disaster Recovery Test

Hypothetical Disasters: Could These Happen To You? In each of the following situations, which have been adapted from actual events, you are the executive on the scene, in charge and you have total responsibility for results. There is no one “right” answer to any of these problems, and the situations address the three (3) types… Continue reading Sample – Disaster Recovery Test

Sample – The Risk Management Worksheet Documents the Process

The process is documented using the Risk Management Worksheet.  Each step will provide general instructions as a guide through completion of the worksheet.  Since the worksheet is generic to all systems, add attachments and / or references as necessary.  Each system will have its own worksheet.  In several of the steps, the advantages of more… Continue reading Sample – The Risk Management Worksheet Documents the Process

Sample – Risk Assessment of the Network

A complete audit of the network described in this example would probably consist of a long and detailed process. To proceed with the audit, additional information such as physical location of the network components, users background (technical knowledge, working hours, security clearance, etc.), maintenance procedures, etc. would be required. Since the intent of this document… Continue reading Sample – Risk Assessment of the Network

Sample – Assessing and Implementing Network Security

Introduction The methodology used in this example to assess the risks consists of the two following phases:   Step 1 – Define the network and identify assets In this step, the network security boundary and scope are defined and an inventory of assets is performed. We assume that information residing and travelling over the network… Continue reading Sample – Assessing and Implementing Network Security

ISO 27002 – Information Security Controls

Introduction Today, generally Corporate Information Security Controls, use the international standard ISO/IEC 27002:2005, Information technology – Security techniques – Code of practice for information security management as an organizational framework to map security controls to and from the Corporate Policy, Standards and procedure documents. Each of the Corporate Enterprise Security Services delivered by IT are… Continue reading ISO 27002 – Information Security Controls

Sample – Operational Risk Vendor Analysis Report Fom

IT Operational Risk considers the impact that a vendor or service provider relationship may have on Corporate’s ability to provide high quality and timely services to customers and business partners, to include data integrity and the confidentiality of company and customers and business partners information. Free – Document download Operational Risk Vendor Analysis Report Fom

Sample Suggested – Corporate IT Policy / Standard Title and Subject Matter

The following is a list of suggested Policies and Standards that all business organizations should have. Corporate Governance Corporate Policy, Policy / Standards and Processes leadership council Firewall Policy / Standard VPN Policy / Standard Remote Connectivity Policy / Standard SCSP Monitoring Policy / Standard.doc Network Monitoring / Sniffer Policy / Standard Egress Monitoring Policy… Continue reading Sample Suggested – Corporate IT Policy / Standard Title and Subject Matter