Secure Operation and Compliance Standard

Secure Operation and Compliance Standard

The objective of the Secure Operation and Compliance Standard is to ensure that the Company adheres to the highest standards of information security. It is committed to upholding client confidentiality and protecting client information. We maintain the confidentiality of any information entrusted to us by our clients, except when disclosure is authorized by them or required by applicable laws, rules or regulations. We share such information internally with appropriate discretion. We apply due care when receiving, handling and storing this data, and adhere to predefined data security standards and procedures designed to prevent unauthorized access, use, modification or destruction.

CONTENT

1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. ROLES & RESPONSIBILITIES
3.1 IT MANAGEMENT
3.2 IT RISK
3.3 OPERATING SYSTEM OWNERS
3.4 SYSTEM DATABASE ADMINISTRATORS
3.5 APPLICATION ADMINISTRATORS/ DEVELOPERS
3.6 BUSINESS INFORMATION ASSET OWNERS
3.7 DATA OWNERS
4. OPERATING SYSTEM SECURITY
4.1 CONFIGURATION
4.2 TECHNOLOGY CONTROLS
4.3 SECURITY IMPLEMENTATION
5. DATABASE SECURITY
5.1 CONFIGURATION
5.2 IMPLEMENTATION
6. APPLICATION SECURITY
6.1 CONFIGURATION
6.2 IMPLEMENTATION
6.3 DESIGN
7. CAPACITY & PERFORMANCE MANAGEMENT
7.1 REQUIREMENTS
7.2 MONITORING
8. NETWORK CONNECTIONS
8.1 NETWORK SECURITY REQUIREMENTS
8.2 APPROVING NETWORK CONNECTIONS
8.3 NETWORK SUPPORT
9. CRYPTOGRAPHIC SECURITY CONTROLS
9.1 CRYPTOGRAPHIC SYSTEMS & KEY MANAGEMENT
9.2 CRYPTOGRAPHIC SYSTEMS & KEY MANAGEMENT PROCEDURES
10. DATA BACKUP & RECOVERY
10.1 REQUIREMENTS
10.2 IMPLEMENTATION
10.3 MANAGING BACKUP & RESTORE
10.4 STORING BACKUPS
10.5 DELETING BACKUPS
11. EVENT DETECTION LOGGING & MONITORING
12. IT INCIDENT & PROBLEM MANAGEMENT
12.1 INCIDENT MANAGEMENT PROCESS
12.2 INCIDENT ASSESSMENT, NOTIFICATION & ESCALATION
12.3 TACTICAL RESPONSE
12.4 PROBLEM MANAGEMENT PROCESS
13. MOBILE DEVICES
14. EXCEPTIONS
15. FINAL CONSIDERATIONS
15.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
15.2 DOCUMENT REVISION

Pages: 38

 

Review Secure Operation and Compliance Standard.

Related Products:

€1,724.99

Purchase

This bundle contains all the products listed in the Data Governance section. Take advantage of the 25% OFF when buying the bundle!

€99.99

Purchase

The objective of the Secure Operation and Compliance Standard is to ensure that the Company adheres to the highest standards of information security. It is committed to upholding client confidentiality and protecting client information.

€49.99

Purchase

The objective of this standard is to define the minimum backup parameters to ensure that mission critical applications, data and archives and Company business applications, user’s data and archives are adequately preserved and protected against data loss and destruction in a format suitable for timely restore and recovery.