Secure Operation and Compliance Standard

Secure Operation and Compliance Standard

The objective of the Secure Operation and Compliance Standard is to ensure that the Company adheres to the highest standards of information security. It is committed to upholding client confidentiality and protecting client information. We maintain the confidentiality of any information entrusted to us by our clients, except when disclosure is authorized by them or required by applicable laws, rules or regulations. We share such information internally with appropriate discretion. We apply due care when receiving, handling and storing this data, and adhere to predefined data security standards and procedures designed to prevent unauthorized access, use, modification or destruction.

CONTENT

1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. ROLES & RESPONSIBILITIES
3.1 IT MANAGEMENT
3.2 IT RISK
3.3 OPERATING SYSTEM OWNERS
3.4 SYSTEM DATABASE ADMINISTRATORS
3.5 APPLICATION ADMINISTRATORS/ DEVELOPERS
3.6 BUSINESS INFORMATION ASSET OWNERS
3.7 DATA OWNERS
4. OPERATING SYSTEM SECURITY
4.1 CONFIGURATION
4.2 TECHNOLOGY CONTROLS
4.3 SECURITY IMPLEMENTATION
5. DATABASE SECURITY
5.1 CONFIGURATION
5.2 IMPLEMENTATION
6. APPLICATION SECURITY
6.1 CONFIGURATION
6.2 IMPLEMENTATION
6.3 DESIGN
7. CAPACITY & PERFORMANCE MANAGEMENT
7.1 REQUIREMENTS
7.2 MONITORING
8. NETWORK CONNECTIONS
8.1 NETWORK SECURITY REQUIREMENTS
8.2 APPROVING NETWORK CONNECTIONS
8.3 NETWORK SUPPORT
9. CRYPTOGRAPHIC SECURITY CONTROLS
9.1 CRYPTOGRAPHIC SYSTEMS & KEY MANAGEMENT
9.2 CRYPTOGRAPHIC SYSTEMS & KEY MANAGEMENT PROCEDURES
10. DATA BACKUP & RECOVERY
10.1 REQUIREMENTS
10.2 IMPLEMENTATION
10.3 MANAGING BACKUP & RESTORE
10.4 STORING BACKUPS
10.5 DELETING BACKUPS
11. EVENT DETECTION LOGGING & MONITORING
12. IT INCIDENT & PROBLEM MANAGEMENT
12.1 INCIDENT MANAGEMENT PROCESS
12.2 INCIDENT ASSESSMENT, NOTIFICATION & ESCALATION
12.3 TACTICAL RESPONSE
12.4 PROBLEM MANAGEMENT PROCESS
13. MOBILE DEVICES
14. EXCEPTIONS
15. FINAL CONSIDERATIONS
15.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
15.2 DOCUMENT REVISION

Pages: 38

 

Review Secure Operation and Compliance Standard.

Your email address will not be published. Required fields are marked *

Related Products:

€1,719.99

Purchase

This bundle contains all the products listed in the Data Governance section. Take advantage of the 25% OFF when buying the bundle!

€99.99

Purchase

The objective of the Secure Operation and Compliance Standard is to ensure that the Company adheres to the highest standards of information security. It is committed to upholding client confidentiality and protecting client information.

€49.99

Purchase

The Cryptographic Control Policy intends to draw the general principles acceptable to the Company for the usage of cryptography.

Get  Your Free Sample

Please use the form below to subscribe to our list and receive a free procedure template!
GET YOUR FREE TEMPLATE
>
close-link