官术网_书友最值得收藏!

Information security program maturity

As you work through the various frameworks, it is important to remember that they are not checklists. These frameworks need to be used to develop your own security program. A key aspect in developing a strong information security program is to understand that you should not be boiling the ocean. By this, I mean that you should not be trying to do so much that you end up doing nothing or worse, causing serious harm to the organization.

As you develop your plan to implement your information security program, you must consider where you are presently from an information security program maturity perspective. As you engage in planning, you need to think about how you can push your program along the maturity life cycle. As an example, you cannot push your organization into a place where you are implementing continuous and effective monitoring of security controls if you are implementing those controls in an ad hoc fashion. You must first focus on developing plans where information security control development is part of the organizational culture and system development life cycle. 

  • Initial:
    • No formal security program in place
    • Unstaffed or understaffed
    • Security controls are implemented in an ad hoc manner or not at all
  • Developing:
    • Basic governance and risk management policies, standards, procedures, and guidelines are in place
    • Information security leadership is in place
    • Informal communications
    • Security controls begin to be developed and implemented
  • Defined:
    • Information security roles such as system owner and data owner are defined
    • Organization-wide polices are in place with inadequate verification
    • More security controls are in place but lack automation
  • Managed:
    • Clearly defined roles and responsibilities accompanied by role-based training
    • Formal information security communication with business stakeholders
    • Controls measured and monitored for compliance
    • Automation is still not fully used throughout the environment
  • Optimized:
    • Culture of organization supports information security improvements for people, processes, and technology
    • Organization implements a risk-based management program for information security
    • Controls are comprehensively implemented across the environment
    • Automation is implemented to support repeatable processes and continuous monitoring
主站蜘蛛池模板: 镇赉县| 蒙城县| 文化| 汪清县| 五寨县| 彝良县| 新干县| 金华市| 抚宁县| 灌阳县| 静宁县| 武夷山市| 延庆县| 乐安县| 尖扎县| 罗源县| 边坝县| 鄂尔多斯市| 新竹市| 兴山县| 梅河口市| 平乐县| 临泽县| 卓尼县| 黎川县| 凤山县| 福海县| 东乡| 高平市| 兴山县| 衡山县| 崇阳县| 金华市| 北京市| 陵川县| 梁河县| 伊吾县| 武鸣县| 襄樊市| 安平县| 巫山县|